Analysis

  • max time kernel
    153s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 05:23

General

  • Target

    8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

  • Size

    655KB

  • MD5

    2ab8e07333108029f754bdc92030b073

  • SHA1

    a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

  • SHA256

    8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

  • SHA512

    a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
    "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:108
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1592
    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
      "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
        "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1636
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1956
        • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
          "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1608
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:1912
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:824

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • \Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • \Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • \Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • memory/952-67-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-77-0x00000000003B0000-0x00000000003D8000-memory.dmp

      Filesize

      160KB

    • memory/952-66-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-64-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-68-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-63-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-72-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-74-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/952-75-0x0000000000330000-0x0000000000340000-memory.dmp

      Filesize

      64KB

    • memory/952-76-0x00000000007C0000-0x000000000086E000-memory.dmp

      Filesize

      696KB

    • memory/1192-83-0x0000000000F90000-0x000000000103A000-memory.dmp

      Filesize

      680KB

    • memory/1312-60-0x0000000002040000-0x000000000204C000-memory.dmp

      Filesize

      48KB

    • memory/1312-54-0x0000000000A20000-0x0000000000ACA000-memory.dmp

      Filesize

      680KB

    • memory/1312-56-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

      Filesize

      8KB

    • memory/1312-61-0x00000000020C0000-0x00000000020CC000-memory.dmp

      Filesize

      48KB

    • memory/1312-58-0x0000000001FE0000-0x0000000001FE8000-memory.dmp

      Filesize

      32KB

    • memory/1312-55-0x0000000000360000-0x000000000038A000-memory.dmp

      Filesize

      168KB

    • memory/1608-103-0x0000000000850000-0x0000000000866000-memory.dmp

      Filesize

      88KB