Analysis

  • max time kernel
    186s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12/06/2022, 16:55

General

  • Target

    1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74.exe

  • Size

    637KB

  • MD5

    bf2ba32ab0d9d73fa0301784d304dbe2

  • SHA1

    a09053ce715e0af5336dbf14e7f997a607efda47

  • SHA256

    1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74

  • SHA512

    0054a61b7a6a4b3f4d0eddfa799ca0ae4307a01e0a1431d1631ecd194fb6d6f4303c339a7744169723911164500f17219002170c5b498446e7e52a0248bfab78

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74.exe
    "C:\Users\Admin\AppData\Local\Temp\1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74.exe" "C:\Users\Admin\AppData\Roaming\smsM.exe"
      2⤵
        PID:1664
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\smsM.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Users\Admin\AppData\Roaming\smsM.exe
          "C:\Users\Admin\AppData\Roaming\smsM.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1456
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1580

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\smsM.exe

        Filesize

        637KB

        MD5

        bf2ba32ab0d9d73fa0301784d304dbe2

        SHA1

        a09053ce715e0af5336dbf14e7f997a607efda47

        SHA256

        1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74

        SHA512

        0054a61b7a6a4b3f4d0eddfa799ca0ae4307a01e0a1431d1631ecd194fb6d6f4303c339a7744169723911164500f17219002170c5b498446e7e52a0248bfab78

      • C:\Users\Admin\AppData\Roaming\smsM.exe

        Filesize

        637KB

        MD5

        bf2ba32ab0d9d73fa0301784d304dbe2

        SHA1

        a09053ce715e0af5336dbf14e7f997a607efda47

        SHA256

        1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74

        SHA512

        0054a61b7a6a4b3f4d0eddfa799ca0ae4307a01e0a1431d1631ecd194fb6d6f4303c339a7744169723911164500f17219002170c5b498446e7e52a0248bfab78

      • \Users\Admin\AppData\Roaming\smsM.exe

        Filesize

        637KB

        MD5

        bf2ba32ab0d9d73fa0301784d304dbe2

        SHA1

        a09053ce715e0af5336dbf14e7f997a607efda47

        SHA256

        1fbe4282fac3f6378b2d36518c39cb8e99e5a6b25317e93ce362f16d3fed2c74

        SHA512

        0054a61b7a6a4b3f4d0eddfa799ca0ae4307a01e0a1431d1631ecd194fb6d6f4303c339a7744169723911164500f17219002170c5b498446e7e52a0248bfab78

      • memory/1456-67-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-75-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-82-0x0000000000B50000-0x0000000000B66000-memory.dmp

        Filesize

        88KB

      • memory/1456-81-0x00000000005F0000-0x0000000000618000-memory.dmp

        Filesize

        160KB

      • memory/1456-80-0x0000000000E50000-0x0000000000EFE000-memory.dmp

        Filesize

        696KB

      • memory/1456-79-0x0000000000350000-0x0000000000360000-memory.dmp

        Filesize

        64KB

      • memory/1456-72-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-77-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-68-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-70-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1456-71-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1724-54-0x0000000000CD0000-0x0000000000D76000-memory.dmp

        Filesize

        664KB

      • memory/1724-55-0x00000000002F0000-0x0000000000318000-memory.dmp

        Filesize

        160KB

      • memory/1724-56-0x00000000769D1000-0x00000000769D3000-memory.dmp

        Filesize

        8KB

      • memory/1724-57-0x00000000004D0000-0x00000000004DA000-memory.dmp

        Filesize

        40KB

      • memory/1832-66-0x00000000008D0000-0x00000000008DC000-memory.dmp

        Filesize

        48KB

      • memory/1832-64-0x00000000013C0000-0x0000000001466000-memory.dmp

        Filesize

        664KB