Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04/06/2022, 13:54

General

  • Target

    0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe

  • Size

    321KB

  • MD5

    d174a4944559cc634b99c3d1bdc317c9

  • SHA1

    425107c55d340e5057b2150813ecfbfbc4f1d79a

  • SHA256

    0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63

  • SHA512

    13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
      "C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:584
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:280
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1868

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe

      Filesize

      321KB

      MD5

      d174a4944559cc634b99c3d1bdc317c9

      SHA1

      425107c55d340e5057b2150813ecfbfbc4f1d79a

      SHA256

      0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63

      SHA512

      13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519

    • C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe

      Filesize

      321KB

      MD5

      d174a4944559cc634b99c3d1bdc317c9

      SHA1

      425107c55d340e5057b2150813ecfbfbc4f1d79a

      SHA256

      0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63

      SHA512

      13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519

    • \Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe

      Filesize

      321KB

      MD5

      d174a4944559cc634b99c3d1bdc317c9

      SHA1

      425107c55d340e5057b2150813ecfbfbc4f1d79a

      SHA256

      0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63

      SHA512

      13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519

    • \Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe

      Filesize

      321KB

      MD5

      d174a4944559cc634b99c3d1bdc317c9

      SHA1

      425107c55d340e5057b2150813ecfbfbc4f1d79a

      SHA256

      0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63

      SHA512

      13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519

    • memory/584-88-0x0000000074620000-0x0000000074DBC000-memory.dmp

      Filesize

      7.6MB

    • memory/584-92-0x00000000727B0000-0x00000000728A1000-memory.dmp

      Filesize

      964KB

    • memory/584-98-0x0000000071F10000-0x0000000071F4A000-memory.dmp

      Filesize

      232KB

    • memory/584-97-0x0000000072910000-0x0000000072AAB000-memory.dmp

      Filesize

      1.6MB

    • memory/584-96-0x0000000074620000-0x0000000074DBC000-memory.dmp

      Filesize

      7.6MB

    • memory/584-95-0x0000000073690000-0x0000000074188000-memory.dmp

      Filesize

      11.0MB

    • memory/584-94-0x0000000074F50000-0x00000000754FB000-memory.dmp

      Filesize

      5.7MB

    • memory/584-93-0x0000000072160000-0x0000000072264000-memory.dmp

      Filesize

      1.0MB

    • memory/584-80-0x0000000074490000-0x0000000074618000-memory.dmp

      Filesize

      1.5MB

    • memory/584-91-0x0000000072AB0000-0x000000007368E000-memory.dmp

      Filesize

      11.9MB

    • memory/584-90-0x0000000071F10000-0x0000000071F4A000-memory.dmp

      Filesize

      232KB

    • memory/584-89-0x0000000072910000-0x0000000072AAB000-memory.dmp

      Filesize

      1.6MB

    • memory/584-85-0x0000000074F50000-0x00000000754FB000-memory.dmp

      Filesize

      5.7MB

    • memory/584-86-0x0000000074F50000-0x00000000754FB000-memory.dmp

      Filesize

      5.7MB

    • memory/584-87-0x0000000073690000-0x0000000074188000-memory.dmp

      Filesize

      11.0MB

    • memory/584-84-0x0000000072160000-0x0000000072264000-memory.dmp

      Filesize

      1.0MB

    • memory/584-82-0x00000000727B0000-0x00000000728A1000-memory.dmp

      Filesize

      964KB

    • memory/584-83-0x0000000072270000-0x00000000727A6000-memory.dmp

      Filesize

      5.2MB

    • memory/584-81-0x0000000072AB0000-0x000000007368E000-memory.dmp

      Filesize

      11.9MB

    • memory/912-78-0x0000000072160000-0x0000000072264000-memory.dmp

      Filesize

      1.0MB

    • memory/912-55-0x0000000074F50000-0x00000000754FB000-memory.dmp

      Filesize

      5.7MB

    • memory/912-79-0x0000000071E70000-0x0000000071EAA000-memory.dmp

      Filesize

      232KB

    • memory/912-76-0x0000000072AB0000-0x000000007368E000-memory.dmp

      Filesize

      11.9MB

    • memory/912-77-0x0000000072910000-0x0000000072AAB000-memory.dmp

      Filesize

      1.6MB

    • memory/912-75-0x0000000074620000-0x0000000074DBC000-memory.dmp

      Filesize

      7.6MB

    • memory/912-74-0x0000000073690000-0x0000000074188000-memory.dmp

      Filesize

      11.0MB

    • memory/912-73-0x0000000074F50000-0x00000000754FB000-memory.dmp

      Filesize

      5.7MB

    • memory/912-54-0x0000000076C81000-0x0000000076C83000-memory.dmp

      Filesize

      8KB

    • memory/912-60-0x0000000072910000-0x0000000072AAB000-memory.dmp

      Filesize

      1.6MB

    • memory/912-61-0x00000000727B0000-0x00000000728A1000-memory.dmp

      Filesize

      964KB

    • memory/912-56-0x0000000073690000-0x0000000074188000-memory.dmp

      Filesize

      11.0MB

    • memory/912-57-0x0000000074620000-0x0000000074DBC000-memory.dmp

      Filesize

      7.6MB

    • memory/912-58-0x0000000074490000-0x0000000074618000-memory.dmp

      Filesize

      1.5MB

    • memory/912-59-0x0000000072AB0000-0x000000007368E000-memory.dmp

      Filesize

      11.9MB

    • memory/912-64-0x0000000071E70000-0x0000000071EAA000-memory.dmp

      Filesize

      232KB

    • memory/912-63-0x0000000072160000-0x0000000072264000-memory.dmp

      Filesize

      1.0MB

    • memory/912-62-0x0000000072270000-0x00000000727A6000-memory.dmp

      Filesize

      5.2MB