Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    09/06/2022, 13:15

General

  • Target

    c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

  • Size

    744KB

  • MD5

    df91ac31038dda3824b7258c65009808

  • SHA1

    c480f3875ed15757371534da167995fd959316f1

  • SHA256

    c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

  • SHA512

    86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe
    "C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe
      "C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe
        "C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe
          "C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1872
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:604
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

      Filesize

      744KB

      MD5

      df91ac31038dda3824b7258c65009808

      SHA1

      c480f3875ed15757371534da167995fd959316f1

      SHA256

      c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

      SHA512

      86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

    • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

      Filesize

      744KB

      MD5

      df91ac31038dda3824b7258c65009808

      SHA1

      c480f3875ed15757371534da167995fd959316f1

      SHA256

      c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

      SHA512

      86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

    • C:\Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

      Filesize

      744KB

      MD5

      df91ac31038dda3824b7258c65009808

      SHA1

      c480f3875ed15757371534da167995fd959316f1

      SHA256

      c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

      SHA512

      86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

    • \Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

      Filesize

      744KB

      MD5

      df91ac31038dda3824b7258c65009808

      SHA1

      c480f3875ed15757371534da167995fd959316f1

      SHA256

      c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

      SHA512

      86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

    • \Users\Admin\AppData\Local\Temp\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd\c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd.exe

      Filesize

      744KB

      MD5

      df91ac31038dda3824b7258c65009808

      SHA1

      c480f3875ed15757371534da167995fd959316f1

      SHA256

      c068d24a8c47c38eaf5211d74c85b0b844d5af259a92e88f7d0cf8ba391328bd

      SHA512

      86a950431d7e17a556b4390aa6fa11bf01bea460176c5ae0b9c9d160ea646d12e0ab68a100fc7a9444eefe100a14062f3cc45b0f0ea559ffb81f8d2cadc05e1a

    • memory/948-62-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-60-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-65-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-67-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-68-0x00000000001E0000-0x00000000001F0000-memory.dmp

      Filesize

      64KB

    • memory/948-69-0x0000000004830000-0x00000000048DE000-memory.dmp

      Filesize

      696KB

    • memory/948-70-0x00000000002A0000-0x00000000002C8000-memory.dmp

      Filesize

      160KB

    • memory/948-71-0x00000000758D1000-0x00000000758D3000-memory.dmp

      Filesize

      8KB

    • memory/948-61-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-57-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/948-58-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1328-76-0x0000000000AF0000-0x0000000000BB2000-memory.dmp

      Filesize

      776KB

    • memory/1708-54-0x0000000000C90000-0x0000000000D52000-memory.dmp

      Filesize

      776KB

    • memory/1708-56-0x0000000000510000-0x000000000052C000-memory.dmp

      Filesize

      112KB

    • memory/1708-55-0x0000000004360000-0x00000000043CA000-memory.dmp

      Filesize

      424KB

    • memory/1872-89-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1872-93-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1872-96-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1872-98-0x0000000000A00000-0x0000000000A16000-memory.dmp

      Filesize

      88KB