Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 05:23

General

  • Target

    8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

  • Size

    655KB

  • MD5

    2ab8e07333108029f754bdc92030b073

  • SHA1

    a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

  • SHA256

    8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

  • SHA512

    a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
    "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2584
    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
      "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
        "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:4628
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3440
        • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe
          "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4364
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:444
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe.log

      Filesize

      990B

      MD5

      d3ceeb3009fe8a9dabf4b591a387e78f

      SHA1

      5c070a1f505a22432879fc12cad7c583ea7d4c39

      SHA256

      12bff9a577e6e37fdc689a18e5f3a13c96f534946727cd61a1fb3316b1ff7b4f

      SHA512

      889461da5e9103033d5f26e7886ad2a7261e38b9a4d648173332225ba095b4d827684889b31eca4d65ea0bd963780982187c6afa5638b63ae63329d614d4bca3

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • C:\Users\Admin\AppData\Local\Temp\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405\8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405.exe

      Filesize

      655KB

      MD5

      2ab8e07333108029f754bdc92030b073

      SHA1

      a7dd4f9d53a10b3caa0b7b5ef7cf005060c14f00

      SHA256

      8645356d9f3fcbdbda84294d29dbf377eea4893ba884c0d134cd75505a204405

      SHA512

      a2709774fc4b8d307bcff51d4dc382c03e189d8568f2d5737583e2370597c7404f11f2e4f34c7289b6521acb32d0391cd82008ea3137e8f02864045afa49e265

    • memory/2208-140-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4364-153-0x0000000007F30000-0x0000000007F3A000-memory.dmp

      Filesize

      40KB

    • memory/5072-137-0x0000000005E50000-0x0000000005EE2000-memory.dmp

      Filesize

      584KB

    • memory/5072-132-0x0000000005480000-0x00000000054E6000-memory.dmp

      Filesize

      408KB

    • memory/5072-134-0x0000000005F10000-0x00000000060D2000-memory.dmp

      Filesize

      1.8MB

    • memory/5072-135-0x0000000006690000-0x0000000006C34000-memory.dmp

      Filesize

      5.6MB

    • memory/5072-130-0x0000000000AA0000-0x0000000000B4A000-memory.dmp

      Filesize

      680KB

    • memory/5072-131-0x0000000005310000-0x0000000005332000-memory.dmp

      Filesize

      136KB

    • memory/5072-138-0x00000000065E0000-0x000000000667C000-memory.dmp

      Filesize

      624KB