Analysis Overview
SHA256
4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965
Threat Level: Known bad
The file 4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965 was found to be: Known bad.
Malicious Activity Summary
Imminent RAT
Drops startup file
Drops desktop.ini file(s)
Suspicious use of SetThreadContext
Drops file in Windows directory
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-07-12 13:01
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-07-12 13:01
Reported
2022-07-12 18:15
Platform
win7-20220414-en
Max time kernel
151s
Max time network
50s
Command Line
Signatures
Imminent RAT
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dhHWkV.url | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1836 set thread context of 1620 | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: 33 | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe
"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.cmdline"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES42CB.tmp" "c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\CSCB0488408E2744401A67D642CCB4EC1F.TMP"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\system32\wbem\WmiApSrv.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
Files
memory/1836-54-0x0000000000870000-0x000000000096A000-memory.dmp
memory/1980-55-0x0000000000000000-mapping.dmp
\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.cmdline
| MD5 | fad33035f10ecb80a3ad3ca0ed37c969 |
| SHA1 | 33bdbb57df103c5b63558a1af7ef985754bbfd19 |
| SHA256 | 51446fc0783d5220e43ea59c881baff9c5e6bf01a57b1f20d7ae44b8c34b51c0 |
| SHA512 | 138a0c849484d6c10adbce8d65189a21b395ef3d2203b7b763f77a511ba81a6cac7df9fdc8860848451f57bce54038f369c2392e25fd0fc8c08ad2eb55b8e5d3 |
\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.0.cs
| MD5 | 28edcfb4f812ac360c0072ac9dd8a697 |
| SHA1 | f742a998c6cc565cffaef5e36a0d7aa06eb575a3 |
| SHA256 | ff3733077d6d202680050c3e15f207e7c1379b5f730072c6740704238444080b |
| SHA512 | 028ec59a0012de42ae78a76e4a9309525e9da0cf95d230de2b678d936ea6514f65131a567a0a7e29a12e68c32cb6e76d9d2d31e506acd847ff2d54d5589fd469 |
memory/1576-58-0x0000000000000000-mapping.dmp
\??\c:\Users\Admin\AppData\Local\Temp\0cjbpzd0\CSCB0488408E2744401A67D642CCB4EC1F.TMP
| MD5 | d884944ed3d3f6b58b3a2512566b1d10 |
| SHA1 | 33d854cfc07eac5baaf5108fa87210e7f2a6e77e |
| SHA256 | a82f667f0bc00c11ed9e97cc0765e229f0dd1cc36adf4e1901910a0b414e0c95 |
| SHA512 | d6d5ef4691f79c226db76af186844d3c956aab7c438c07df4fc4130179a8ba2ae9714b1ae979c02f45eaa5baf404c634bd36ec3e64dddae9a8bca17144a2fcd6 |
C:\Users\Admin\AppData\Local\Temp\RES42CB.tmp
| MD5 | ae093a4191be6871227a763f6fcf37e4 |
| SHA1 | 644410d18d4a9404fdfbdba79be4e8eb1fdd2541 |
| SHA256 | 0c4371425084e433c0df9cc5a86a6c56c0fb0724be09e064e50d19355943234c |
| SHA512 | c0d3cdd62c866fc93ab8ed1c2a0e5d0fafed65c2ad3c2829139eea9efac7ee4e000c8376abc5a248959473f61ebf9c51f2e864835b6a127494bc5c134e909c21 |
C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.pdb
| MD5 | 413f191494568ecf7d355b4f56b32460 |
| SHA1 | 227622ac85ead5da9e23289044aa98068e0f0c8a |
| SHA256 | 808b12316ca4cb38f0ef80ad44439c444ee37239a8e3a496ba74fa18e63d1642 |
| SHA512 | 1cb1f553ee1f4d833ae8fc35c41a8ec9b1d3f95a11ab12f0ea7d344435cb3cad07c23df661d9e6b5a0fc746d0e8dc9a47a20ec43212a5a723b047e4687e5a506 |
C:\Users\Admin\AppData\Local\Temp\0cjbpzd0\0cjbpzd0.dll
| MD5 | 3e4b6a51a6537125b9daf45290ea3928 |
| SHA1 | 393caf3f50446a85390ce364d5841e471f08d021 |
| SHA256 | 2da0e35e3c84f5df2aaae56692383930b6c8baa104f5ebe9808ab18803179181 |
| SHA512 | 9a05f2a8d2059ffd175d79c59065df117fa3ccf50a637bf3e3eccefe1e0d5bf54d5dfd3649a88dff338b4dcacdd5e64b930fbcba73b33e39177347d7b07294cf |
memory/1836-63-0x00000000001C0000-0x00000000001CE000-memory.dmp
memory/1836-64-0x0000000000800000-0x0000000000860000-memory.dmp
memory/1836-65-0x0000000000270000-0x000000000027C000-memory.dmp
memory/1836-66-0x0000000075741000-0x0000000075743000-memory.dmp
memory/1836-67-0x0000000004310000-0x0000000004366000-memory.dmp
memory/1620-68-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-69-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-71-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-72-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-73-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-74-0x0000000000451E5E-mapping.dmp
memory/1620-78-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-76-0x0000000000400000-0x0000000000456000-memory.dmp
memory/1620-80-0x0000000074A50000-0x0000000074FFB000-memory.dmp
memory/1620-81-0x0000000074A50000-0x0000000074FFB000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-07-12 13:01
Reported
2022-07-12 18:15
Platform
win10v2004-20220414-en
Max time kernel
151s
Max time network
153s
Command Line
Signatures
Imminent RAT
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dhHWkV.url | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
Drops desktop.ini file(s)
| Description | Indicator | Process | Target |
| File created | C:\Windows\assembly\Desktop.ini | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| File opened for modification | C:\Windows\assembly\Desktop.ini | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4528 set thread context of 4524 | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\assembly | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| File created | C:\Windows\assembly\Desktop.ini | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| File opened for modification | C:\Windows\assembly\Desktop.ini | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: 33 | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe
"C:\Users\Admin\AppData\Local\Temp\4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.cmdline"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB03A.tmp" "c:\Users\Admin\AppData\Local\Temp\ba21n4wt\CSC4396276D585B42E3B435A72A6F57C03D.TMP"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\system32\wbem\WmiApSrv.exe
Network
| Country | Destination | Domain | Proto |
| IE | 52.109.76.32:443 | tcp | |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| FR | 2.18.109.224:443 | tcp | |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| IE | 13.69.239.73:443 | tcp | |
| US | 104.18.25.243:80 | tcp | |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| NL | 104.110.191.140:80 | tcp | |
| NL | 104.110.191.140:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 93.184.220.29:80 | tcp | |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
| US | 8.8.8.8:53 | zynovahk.duckdns.org | udp |
Files
memory/4528-130-0x0000000000D70000-0x0000000000E6A000-memory.dmp
memory/3100-131-0x0000000000000000-mapping.dmp
\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.cmdline
| MD5 | a93fd8c177639da409958d5118235374 |
| SHA1 | 241aa4bb38c85f6c027353e8199d5b7bfc3f5de6 |
| SHA256 | c6dc8c69b24836b60ecf5e949b5f4baea37e35f1428df9a74c4c38602149dc5f |
| SHA512 | d5cb9d4501ef1097582ffd754baf26ba513426743b357ead59ceed4fd1a4cb52342282b2f13cae474000224206edb9165ea94205a14d82cd41af6d54c7054dfa |
\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.0.cs
| MD5 | 28edcfb4f812ac360c0072ac9dd8a697 |
| SHA1 | f742a998c6cc565cffaef5e36a0d7aa06eb575a3 |
| SHA256 | ff3733077d6d202680050c3e15f207e7c1379b5f730072c6740704238444080b |
| SHA512 | 028ec59a0012de42ae78a76e4a9309525e9da0cf95d230de2b678d936ea6514f65131a567a0a7e29a12e68c32cb6e76d9d2d31e506acd847ff2d54d5589fd469 |
memory/4640-134-0x0000000000000000-mapping.dmp
\??\c:\Users\Admin\AppData\Local\Temp\ba21n4wt\CSC4396276D585B42E3B435A72A6F57C03D.TMP
| MD5 | 079196d084bc4efccabadd5a2bdcf2a9 |
| SHA1 | 2af2a95bbcc270f747335aa9a1b102edc0d4b7e1 |
| SHA256 | f7c0e9f77673d53017942d05449b05b362997b9a28e0fa4d8cbb0d9a864b9ce9 |
| SHA512 | db3b02a6cc1fa10174ff0ee26cd4c9245d969a53b5b6a828268769b2316d25f9de93173cf38f3b1e679a3831f250d6c9ae149cf6473aacda3bb0e0e8b8ac80d8 |
C:\Users\Admin\AppData\Local\Temp\RESB03A.tmp
| MD5 | 4645c35e7e65d4cf076f028e8cf4e515 |
| SHA1 | c6b26981aab8ac0dfb41e84245f3049eefa26e0e |
| SHA256 | 1851e6d939afabfe99baee8788b87995c6462a79e0faba5e4b0dd58b89e46207 |
| SHA512 | 802e333ff3d06b6cd83819dc10de7f9305fafe20f4c25de29637c9b83f3f9af3e1971fb260022c5f9bb8dc7d0403995aadc11292255093647f09c41c8f8ef5aa |
C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.pdb
| MD5 | 97fc8deb43503817b005abdf345bebc7 |
| SHA1 | 81b332a7477bbddde8555af5619442c5c57035cf |
| SHA256 | 1ae8546c68e3007b2ce6a1639b0ac1c57022f2ce2bb6016e2c4fcebf7487ab30 |
| SHA512 | 66002f2ebe5e3407358226777cb92b91edd557f87f50d116384b0e38972828b904811792e7e3cfaf9cd8486efe7c6c552b8ace20c377c53627396acf8963af7e |
C:\Users\Admin\AppData\Local\Temp\ba21n4wt\ba21n4wt.dll
| MD5 | b0427f51a3f606d9128dbb107ca140fd |
| SHA1 | d9281af6821b2a9cc570d0f4e89711b0a52fe45d |
| SHA256 | 6cb20ded227a866a76f30c8f0c421153ad294d9e7f21bb027afa17cce1eda305 |
| SHA512 | 45a8634b3909ab7dbb4a7452784dc483b1454cfe8788b9bdb1c4c0e8033239c7de6d655eba7fd709c6fd8430947563c993629314238343b05190b085fda7bdf1 |
memory/4528-139-0x0000000005700000-0x0000000005792000-memory.dmp
memory/4528-140-0x0000000005DA0000-0x0000000005E3C000-memory.dmp
memory/4524-141-0x0000000000000000-mapping.dmp
memory/4524-142-0x0000000000400000-0x0000000000456000-memory.dmp
memory/4524-143-0x0000000074F80000-0x0000000075531000-memory.dmp
memory/4524-144-0x0000000074F80000-0x0000000075531000-memory.dmp