Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12/06/2022, 18:45

General

  • Target

    1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe

  • Size

    958KB

  • MD5

    f1192a02588dfb2051b7524545a7d0f3

  • SHA1

    0569b1b17c61f8d79d207fd12433689ae386cb4f

  • SHA256

    1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

  • SHA512

    f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • NTFS ADS 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe
    "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Temp\FontCache.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\FontCache.exe
        "C:\Users\Admin\AppData\Local\Temp\FontCache.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3956
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:4840
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\FontCache.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
          4⤵
          • NTFS ADS
          PID:4284
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Drops startup file
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2492
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:1156
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:2804
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1460
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 1808
              6⤵
              • Program crash
              PID:1224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2492 -ip 2492
    1⤵
      PID:3600
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4668

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\FontCache.exe

        Filesize

        958KB

        MD5

        f1192a02588dfb2051b7524545a7d0f3

        SHA1

        0569b1b17c61f8d79d207fd12433689ae386cb4f

        SHA256

        1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

        SHA512

        f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

        Filesize

        958KB

        MD5

        f1192a02588dfb2051b7524545a7d0f3

        SHA1

        0569b1b17c61f8d79d207fd12433689ae386cb4f

        SHA256

        1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

        SHA512

        f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

        Filesize

        958KB

        MD5

        f1192a02588dfb2051b7524545a7d0f3

        SHA1

        0569b1b17c61f8d79d207fd12433689ae386cb4f

        SHA256

        1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

        SHA512

        f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

      • memory/1460-153-0x0000000007CE0000-0x0000000007CEA000-memory.dmp

        Filesize

        40KB

      • memory/1460-152-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2492-150-0x00000000072C0000-0x000000000735C000-memory.dmp

        Filesize

        624KB

      • memory/4788-135-0x00000000064C0000-0x0000000006A64000-memory.dmp

        Filesize

        5.6MB

      • memory/4788-134-0x0000000005EE0000-0x0000000005F02000-memory.dmp

        Filesize

        136KB

      • memory/4788-130-0x00000000008F0000-0x00000000009E6000-memory.dmp

        Filesize

        984KB

      • memory/4788-137-0x0000000006000000-0x0000000006092000-memory.dmp

        Filesize

        584KB

      • memory/4788-132-0x0000000005630000-0x00000000057F2000-memory.dmp

        Filesize

        1.8MB

      • memory/4788-131-0x00000000053F0000-0x0000000005456000-memory.dmp

        Filesize

        408KB