Analysis

  • max time kernel
    151s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08/06/2022, 17:56

General

  • Target

    1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe

  • Size

    320KB

  • MD5

    4220a0e8153d9bec257da70683c42cb4

  • SHA1

    ad5ada0f306bb4e77bbbc3c274fd3a338a2c39e4

  • SHA256

    1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb

  • SHA512

    5fcc3cb36f0d158e3ff41caf026c6da6ee95fc07d8e993b09594d3a4065dec7f16bb68eb45f2deb25e115c3aefffd6164daa9cd3c308548b1e306b42a72b9e26

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe
    "C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe
      "C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:1532
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1428

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe

      Filesize

      320KB

      MD5

      4220a0e8153d9bec257da70683c42cb4

      SHA1

      ad5ada0f306bb4e77bbbc3c274fd3a338a2c39e4

      SHA256

      1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb

      SHA512

      5fcc3cb36f0d158e3ff41caf026c6da6ee95fc07d8e993b09594d3a4065dec7f16bb68eb45f2deb25e115c3aefffd6164daa9cd3c308548b1e306b42a72b9e26

    • C:\Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe

      Filesize

      320KB

      MD5

      4220a0e8153d9bec257da70683c42cb4

      SHA1

      ad5ada0f306bb4e77bbbc3c274fd3a338a2c39e4

      SHA256

      1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb

      SHA512

      5fcc3cb36f0d158e3ff41caf026c6da6ee95fc07d8e993b09594d3a4065dec7f16bb68eb45f2deb25e115c3aefffd6164daa9cd3c308548b1e306b42a72b9e26

    • \Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe

      Filesize

      320KB

      MD5

      4220a0e8153d9bec257da70683c42cb4

      SHA1

      ad5ada0f306bb4e77bbbc3c274fd3a338a2c39e4

      SHA256

      1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb

      SHA512

      5fcc3cb36f0d158e3ff41caf026c6da6ee95fc07d8e993b09594d3a4065dec7f16bb68eb45f2deb25e115c3aefffd6164daa9cd3c308548b1e306b42a72b9e26

    • \Users\Admin\AppData\Local\Temp\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb\1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb.exe

      Filesize

      320KB

      MD5

      4220a0e8153d9bec257da70683c42cb4

      SHA1

      ad5ada0f306bb4e77bbbc3c274fd3a338a2c39e4

      SHA256

      1844736c9adbe4513f56f0790427ffc64f68bcd51b0d86ebf683388ed6d74feb

      SHA512

      5fcc3cb36f0d158e3ff41caf026c6da6ee95fc07d8e993b09594d3a4065dec7f16bb68eb45f2deb25e115c3aefffd6164daa9cd3c308548b1e306b42a72b9e26

    • memory/676-66-0x0000000073F90000-0x000000007453B000-memory.dmp

      Filesize

      5.7MB

    • memory/676-67-0x0000000073F90000-0x000000007453B000-memory.dmp

      Filesize

      5.7MB

    • memory/1904-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

      Filesize

      8KB

    • memory/1904-56-0x0000000073F90000-0x000000007453B000-memory.dmp

      Filesize

      5.7MB

    • memory/1904-55-0x0000000073F90000-0x000000007453B000-memory.dmp

      Filesize

      5.7MB

    • memory/1904-65-0x0000000073F90000-0x000000007453B000-memory.dmp

      Filesize

      5.7MB