Malware Analysis Report

2024-11-30 16:01

Sample ID 220614-11ntgafbfk
Target 2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059
SHA256 2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059
Tags
imminent persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059

Threat Level: Known bad

The file 2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059 was found to be: Known bad.

Malicious Activity Summary

imminent persistence spyware trojan

Imminent RAT

Adds Run key to start application

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-06-14 22:07

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-06-14 22:07

Reported

2022-06-14 23:25

Platform

win7-20220414-en

Max time kernel

150s

Max time network

43s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe"

Signatures

Imminent RAT

trojan spyware imminent

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\unreal engine = "C:\\Users\\Admin\\AppData\\Roaming\\\\.exe" C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe

"C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe"

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 rat25565.ddns.net udp

Files

memory/2016-54-0x0000000000920000-0x0000000000976000-memory.dmp

memory/2016-55-0x00000000002F0000-0x0000000000300000-memory.dmp

memory/2016-56-0x0000000004680000-0x000000000472E000-memory.dmp

memory/2016-57-0x00000000003F0000-0x0000000000418000-memory.dmp

memory/2016-58-0x0000000075191000-0x0000000075193000-memory.dmp

memory/2016-59-0x00000000004D0000-0x00000000004E6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-06-14 22:07

Reported

2022-06-14 23:25

Platform

win10v2004-20220414-en

Max time kernel

152s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe"

Signatures

Imminent RAT

trojan spyware imminent

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unreal engine = "C:\\Users\\Admin\\AppData\\Roaming\\\\.exe" C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe

"C:\Users\Admin\AppData\Local\Temp\2ca8b21a20da510fa7229c232046d5ef366e633e9c6151479a2cde822cde6059.exe"

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 rat25565.ddns.net udp
US 93.184.220.29:80 tcp
NL 104.110.191.140:80 tcp
NL 104.110.191.140:80 tcp
US 8.8.8.8:53 rat25565.ddns.net udp
NL 13.69.109.130:443 tcp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 176.122.125.40.in-addr.arpa udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp
US 8.8.8.8:53 rat25565.ddns.net udp

Files

memory/2272-130-0x00000000000B0000-0x0000000000106000-memory.dmp

memory/2272-131-0x00000000060B0000-0x000000000614C000-memory.dmp

memory/2272-132-0x0000000006700000-0x0000000006CA4000-memory.dmp

memory/2272-133-0x0000000006330000-0x00000000063C2000-memory.dmp

memory/2272-134-0x0000000006D20000-0x0000000006D86000-memory.dmp

memory/2272-135-0x00000000074F0000-0x00000000074FA000-memory.dmp