Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 18:53

General

  • Target

    448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

  • Size

    627KB

  • MD5

    e21ce3b569be0bce5f0524bf09851718

  • SHA1

    93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

  • SHA256

    448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

  • SHA512

    315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe
    "C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe
      "C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe
        "C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe
          "C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:892
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:1744
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1580

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

      Filesize

      627KB

      MD5

      e21ce3b569be0bce5f0524bf09851718

      SHA1

      93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

      SHA256

      448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

      SHA512

      315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

    • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

      Filesize

      627KB

      MD5

      e21ce3b569be0bce5f0524bf09851718

      SHA1

      93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

      SHA256

      448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

      SHA512

      315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

    • C:\Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

      Filesize

      627KB

      MD5

      e21ce3b569be0bce5f0524bf09851718

      SHA1

      93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

      SHA256

      448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

      SHA512

      315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

    • \Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

      Filesize

      627KB

      MD5

      e21ce3b569be0bce5f0524bf09851718

      SHA1

      93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

      SHA256

      448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

      SHA512

      315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

    • \Users\Admin\AppData\Local\Temp\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5\448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5.exe

      Filesize

      627KB

      MD5

      e21ce3b569be0bce5f0524bf09851718

      SHA1

      93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e

      SHA256

      448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5

      SHA512

      315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f

    • memory/892-100-0x00000000005A0000-0x00000000005B6000-memory.dmp

      Filesize

      88KB

    • memory/892-98-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/892-96-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1348-62-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-63-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-66-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-71-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-74-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-75-0x00000000002F0000-0x0000000000300000-memory.dmp

      Filesize

      64KB

    • memory/1348-76-0x0000000004DA0000-0x0000000004E4E000-memory.dmp

      Filesize

      696KB

    • memory/1348-77-0x0000000000350000-0x0000000000378000-memory.dmp

      Filesize

      160KB

    • memory/1348-78-0x0000000076431000-0x0000000076433000-memory.dmp

      Filesize

      8KB

    • memory/1348-59-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-67-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1348-60-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/1528-83-0x0000000000DB0000-0x0000000000E54000-memory.dmp

      Filesize

      656KB

    • memory/1684-54-0x00000000001D0000-0x0000000000274000-memory.dmp

      Filesize

      656KB

    • memory/1684-58-0x00000000005F0000-0x00000000005FA000-memory.dmp

      Filesize

      40KB

    • memory/1684-57-0x0000000000600000-0x000000000060E000-memory.dmp

      Filesize

      56KB

    • memory/1684-56-0x0000000000480000-0x000000000048A000-memory.dmp

      Filesize

      40KB

    • memory/1684-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB