Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04/06/2022, 18:36

General

  • Target

    0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

  • Size

    887KB

  • MD5

    5254548426fabd56ac93ac853a416d42

  • SHA1

    9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

  • SHA256

    0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

  • SHA512

    f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe
    "C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe
      "C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe
        "C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe
          "C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1564
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:684
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1524

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

      Filesize

      887KB

      MD5

      5254548426fabd56ac93ac853a416d42

      SHA1

      9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

      SHA256

      0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

      SHA512

      f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

    • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

      Filesize

      887KB

      MD5

      5254548426fabd56ac93ac853a416d42

      SHA1

      9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

      SHA256

      0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

      SHA512

      f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

    • C:\Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

      Filesize

      887KB

      MD5

      5254548426fabd56ac93ac853a416d42

      SHA1

      9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

      SHA256

      0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

      SHA512

      f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

    • \Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

      Filesize

      887KB

      MD5

      5254548426fabd56ac93ac853a416d42

      SHA1

      9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

      SHA256

      0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

      SHA512

      f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

    • \Users\Admin\AppData\Local\Temp\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349\0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349.exe

      Filesize

      887KB

      MD5

      5254548426fabd56ac93ac853a416d42

      SHA1

      9bef9b9c3ae82c8ab195e6ac025b9af3f10ef338

      SHA256

      0e88c6fb0ee6e6f4312720edf7f2268986cf30a7bbe5ddec96547c3bd1d12349

      SHA512

      f8f5301ce64a1c29fc46c606fe0137ffe00a358069eb3f52f8361079ea18cec0301d9c472dabce117f702e74a17cbd63321c111094e063a2d2e3cec092af13f1

    • memory/1244-94-0x0000000070080000-0x0000000070D9D000-memory.dmp

      Filesize

      13.1MB

    • memory/1244-73-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1244-120-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1244-119-0x000000006F730000-0x000000006F762000-memory.dmp

      Filesize

      200KB

    • memory/1244-117-0x000000006FF80000-0x000000007007C000-memory.dmp

      Filesize

      1008KB

    • memory/1244-116-0x0000000073BF0000-0x0000000073D13000-memory.dmp

      Filesize

      1.1MB

    • memory/1244-115-0x0000000070080000-0x0000000070D9D000-memory.dmp

      Filesize

      13.1MB

    • memory/1244-113-0x00000000739F0000-0x0000000073BC1000-memory.dmp

      Filesize

      1.8MB

    • memory/1244-97-0x000000006FF80000-0x000000007007C000-memory.dmp

      Filesize

      1008KB

    • memory/1244-112-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1244-110-0x0000000000A50000-0x0000000000B36000-memory.dmp

      Filesize

      920KB

    • memory/1244-87-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1244-98-0x000000006F840000-0x000000006FF7E000-memory.dmp

      Filesize

      7.2MB

    • memory/1244-90-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1244-76-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1244-78-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1244-96-0x0000000073BF0000-0x0000000073D13000-memory.dmp

      Filesize

      1.1MB

    • memory/1244-80-0x0000000000260000-0x0000000000270000-memory.dmp

      Filesize

      64KB

    • memory/1244-93-0x0000000073850000-0x00000000739E4000-memory.dmp

      Filesize

      1.6MB

    • memory/1244-82-0x0000000004670000-0x000000000471E000-memory.dmp

      Filesize

      696KB

    • memory/1244-92-0x00000000739F0000-0x0000000073BC1000-memory.dmp

      Filesize

      1.8MB

    • memory/1244-85-0x00000000003C0000-0x00000000003E8000-memory.dmp

      Filesize

      160KB

    • memory/1244-91-0x0000000070DA0000-0x0000000071580000-memory.dmp

      Filesize

      7.9MB

    • memory/1244-89-0x0000000000A50000-0x0000000000B36000-memory.dmp

      Filesize

      920KB

    • memory/1244-99-0x000000006F730000-0x000000006F762000-memory.dmp

      Filesize

      200KB

    • memory/1552-79-0x0000000000A50000-0x0000000000B36000-memory.dmp

      Filesize

      920KB

    • memory/1552-56-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1552-84-0x0000000073BF0000-0x0000000073D84000-memory.dmp

      Filesize

      1.6MB

    • memory/1552-83-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1552-81-0x000000006F940000-0x0000000070120000-memory.dmp

      Filesize

      7.9MB

    • memory/1552-54-0x0000000000A50000-0x0000000000B36000-memory.dmp

      Filesize

      920KB

    • memory/1552-61-0x0000000070860000-0x000000007157D000-memory.dmp

      Filesize

      13.1MB

    • memory/1552-68-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1552-60-0x0000000000470000-0x000000000048E000-memory.dmp

      Filesize

      120KB

    • memory/1552-88-0x0000000070860000-0x000000007157D000-memory.dmp

      Filesize

      13.1MB

    • memory/1552-72-0x0000000012190000-0x0000000012276000-memory.dmp

      Filesize

      920KB

    • memory/1552-55-0x0000000000A50000-0x0000000000B36000-memory.dmp

      Filesize

      920KB

    • memory/1552-59-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1552-58-0x0000000006E90000-0x0000000006F6C000-memory.dmp

      Filesize

      880KB

    • memory/1552-86-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1552-62-0x00000000759E1000-0x00000000759E3000-memory.dmp

      Filesize

      8KB

    • memory/1552-63-0x0000000073AD0000-0x0000000073BCC000-memory.dmp

      Filesize

      1008KB

    • memory/1552-64-0x0000000070120000-0x000000007085E000-memory.dmp

      Filesize

      7.2MB

    • memory/1552-71-0x000000006F760000-0x000000006F931000-memory.dmp

      Filesize

      1.8MB

    • memory/1552-70-0x0000000073AD0000-0x0000000073BCC000-memory.dmp

      Filesize

      1008KB

    • memory/1552-57-0x0000000073BF0000-0x0000000073D84000-memory.dmp

      Filesize

      1.6MB

    • memory/1552-69-0x0000000070860000-0x000000007157D000-memory.dmp

      Filesize

      13.1MB

    • memory/1552-67-0x0000000073BF0000-0x0000000073D84000-memory.dmp

      Filesize

      1.6MB

    • memory/1552-65-0x000000006F940000-0x0000000070120000-memory.dmp

      Filesize

      7.9MB

    • memory/1552-66-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1880-126-0x0000000004E50000-0x0000000004F36000-memory.dmp

      Filesize

      920KB

    • memory/1880-127-0x0000000073850000-0x00000000739E4000-memory.dmp

      Filesize

      1.6MB

    • memory/1880-106-0x0000000073850000-0x00000000739E4000-memory.dmp

      Filesize

      1.6MB

    • memory/1880-114-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1880-121-0x000000006F840000-0x000000006FF7E000-memory.dmp

      Filesize

      7.2MB

    • memory/1880-122-0x0000000070DA0000-0x0000000071580000-memory.dmp

      Filesize

      7.9MB

    • memory/1880-123-0x000000006FF80000-0x000000007007C000-memory.dmp

      Filesize

      1008KB

    • memory/1880-124-0x000000006F540000-0x000000006F711000-memory.dmp

      Filesize

      1.8MB

    • memory/1880-118-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1880-104-0x0000000000DE0000-0x0000000000EC6000-memory.dmp

      Filesize

      920KB

    • memory/1880-105-0x0000000000DE0000-0x0000000000EC6000-memory.dmp

      Filesize

      920KB

    • memory/1880-128-0x0000000070080000-0x0000000070D9D000-memory.dmp

      Filesize

      13.1MB

    • memory/1880-129-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1880-130-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB

    • memory/1880-131-0x0000000070DA0000-0x0000000071580000-memory.dmp

      Filesize

      7.9MB

    • memory/1880-107-0x0000000070080000-0x0000000070D9D000-memory.dmp

      Filesize

      13.1MB

    • memory/1880-139-0x0000000071F90000-0x000000007331F000-memory.dmp

      Filesize

      19.6MB

    • memory/1880-140-0x0000000071580000-0x0000000071F90000-memory.dmp

      Filesize

      10.1MB