Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03/06/2022, 22:50

General

  • Target

    11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43.exe

  • Size

    756KB

  • MD5

    4df228d57f566b60975c6bb6135bfc44

  • SHA1

    6c39efaafd4d52c473eaae7de32cbb976a5dcfe6

  • SHA256

    11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43

  • SHA512

    b25c25d16e335e58c80d8794f70b64744bd6188730cc4b195aaa6e2113b4314253b91c8e39024cef0a4877f584b09dd57dee1cb56ce78b37a1492902645fd55d

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43.exe
    "C:\Users\Admin\AppData\Local\Temp\11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43.exe" "C:\Users\Admin\Documents\app.exe"
      2⤵
        PID:4388
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Documents\app.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Users\Admin\Documents\app.exe
          "C:\Users\Admin\Documents\app.exe"
          3⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3124
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Documents\app.exe

        Filesize

        756KB

        MD5

        4df228d57f566b60975c6bb6135bfc44

        SHA1

        6c39efaafd4d52c473eaae7de32cbb976a5dcfe6

        SHA256

        11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43

        SHA512

        b25c25d16e335e58c80d8794f70b64744bd6188730cc4b195aaa6e2113b4314253b91c8e39024cef0a4877f584b09dd57dee1cb56ce78b37a1492902645fd55d

      • C:\Users\Admin\Documents\app.exe

        Filesize

        756KB

        MD5

        4df228d57f566b60975c6bb6135bfc44

        SHA1

        6c39efaafd4d52c473eaae7de32cbb976a5dcfe6

        SHA256

        11fef3ffa74a3151c5af1b7b8eaad7ae248521e15521a8e5b0ed386f2ace8d43

        SHA512

        b25c25d16e335e58c80d8794f70b64744bd6188730cc4b195aaa6e2113b4314253b91c8e39024cef0a4877f584b09dd57dee1cb56ce78b37a1492902645fd55d

      • memory/1240-131-0x0000000005090000-0x0000000005634000-memory.dmp

        Filesize

        5.6MB

      • memory/1240-132-0x0000000004AE0000-0x0000000004B72000-memory.dmp

        Filesize

        584KB

      • memory/1240-133-0x0000000004CA0000-0x0000000004CAA000-memory.dmp

        Filesize

        40KB

      • memory/1240-130-0x0000000000010000-0x00000000000D4000-memory.dmp

        Filesize

        784KB

      • memory/3124-142-0x0000000006FF0000-0x0000000007056000-memory.dmp

        Filesize

        408KB

      • memory/3124-141-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/3748-139-0x0000000008500000-0x000000000859C000-memory.dmp

        Filesize

        624KB