Malware Analysis Report

2024-11-30 16:02

Sample ID 220712-pmah5scge2
Target 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706
SHA256 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706
Tags
imminent spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706

Threat Level: Known bad

The file 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706 was found to be: Known bad.

Malicious Activity Summary

imminent spyware trojan

Imminent RAT

Executes dropped EXE

Checks computer location settings

Drops startup file

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

NTFS ADS

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-07-12 12:26

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-07-12 12:26

Reported

2022-07-12 18:13

Platform

win10v2004-20220414-en

Max time kernel

151s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe"

Signatures

Imminent RAT

trojan spyware imminent

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fontdrvhost.lnk C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1452 set thread context of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe\:Zone.Identifier:$DATA C:\Windows\SysWOW64\cmd.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4396 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 4396 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe C:\Windows\SysWOW64\cmd.exe
PID 1640 wrote to memory of 1452 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1640 wrote to memory of 1452 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1640 wrote to memory of 1452 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Windows\SysWOW64\cmd.exe
PID 1452 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Windows\SysWOW64\cmd.exe
PID 1452 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Windows\SysWOW64\cmd.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe
PID 1452 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe

"C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe:Zone.Identifier"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe:Zone.Identifier"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

C:\Windows\system32\wbem\WmiApSrv.exe

C:\Windows\system32\wbem\WmiApSrv.exe

Network

Country Destination Domain Proto
US 52.182.143.208:443 tcp
US 204.79.197.200:443 tcp
US 8.8.8.8:53 linkadrum.nl udp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
US 8.8.8.8:53 linkadrum.nl udp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp
DE 185.140.53.144:9630 linkadrum.nl tcp

Files

memory/4396-130-0x0000000000050000-0x00000000000F8000-memory.dmp

memory/4396-131-0x00000000049E0000-0x0000000004A02000-memory.dmp

memory/4396-132-0x0000000004AB0000-0x0000000004B42000-memory.dmp

memory/4396-133-0x0000000004B50000-0x0000000004BB6000-memory.dmp

memory/4396-134-0x0000000004A40000-0x0000000004A62000-memory.dmp

memory/4396-135-0x0000000004D90000-0x0000000004F52000-memory.dmp

memory/4504-136-0x0000000000000000-mapping.dmp

memory/4396-137-0x0000000005D60000-0x0000000006304000-memory.dmp

memory/220-138-0x0000000000000000-mapping.dmp

memory/1640-139-0x0000000000000000-mapping.dmp

memory/1452-140-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

MD5 ea8c8008dc1f3f4025baec1d16495917
SHA1 145c3e9890d665a5a98a32935e6e50e81885c5a8
SHA256 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706
SHA512 ce94265ed85e11ddad87e6b0bbeb69cf275087e03775fcd4acaca751b454797a07b243cf3485fe7180281289b5a73aeafe088417d3fa376c141b61fb8433f4f3

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

MD5 ea8c8008dc1f3f4025baec1d16495917
SHA1 145c3e9890d665a5a98a32935e6e50e81885c5a8
SHA256 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706
SHA512 ce94265ed85e11ddad87e6b0bbeb69cf275087e03775fcd4acaca751b454797a07b243cf3485fe7180281289b5a73aeafe088417d3fa376c141b61fb8433f4f3

memory/4600-143-0x0000000000000000-mapping.dmp

memory/1452-144-0x0000000007070000-0x000000000710C000-memory.dmp

memory/1916-145-0x0000000000000000-mapping.dmp

memory/1916-146-0x0000000000400000-0x0000000000456000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\fontdrvhost.exe

MD5 ea8c8008dc1f3f4025baec1d16495917
SHA1 145c3e9890d665a5a98a32935e6e50e81885c5a8
SHA256 4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706
SHA512 ce94265ed85e11ddad87e6b0bbeb69cf275087e03775fcd4acaca751b454797a07b243cf3485fe7180281289b5a73aeafe088417d3fa376c141b61fb8433f4f3

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fontdrvhost.exe.log

MD5 05054fe97857e8cf5f8469d0517ef3a0
SHA1 5745b1916087fe36bf0076d63f54402daaaa382d
SHA256 4776b8faed8002d836b94d6e423f0e3436cda349b26e0d5c9373f3941080985c
SHA512 a0a68ae503ec0e79d43246f8a100fac6264573f97fe9340842a20973d14c1617fd36c0f38d5124516d40e6230291cd50627c061a36921977362efb122afa064b

memory/1916-149-0x0000000007F40000-0x0000000007F4A000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-12 12:26

Reported

2022-07-12 18:13

Platform

win7-20220414-en

Max time kernel

144s

Max time network

48s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe"

Signatures

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe

"C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\4ab258871e20f9249533c808727fa8b6520bc56424a88a40f5e689cba4e6f706.exe:Zone.Identifier"

Network

N/A

Files

memory/2028-54-0x0000000001050000-0x00000000010F8000-memory.dmp

memory/2028-55-0x00000000003E0000-0x0000000000402000-memory.dmp

memory/2028-56-0x0000000076261000-0x0000000076263000-memory.dmp

memory/1520-57-0x0000000000000000-mapping.dmp