Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 20:58

General

  • Target

    5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e.exe

  • Size

    903KB

  • MD5

    88494e93da17c74c2857881b8313507c

  • SHA1

    2a35eee7686193af76e9d2e103c2c4a95d7f6de0

  • SHA256

    5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e

  • SHA512

    4cc65b70760072b498e3eb3eef292b2e5c47baecf92d102331708dff19d6d152d0a262114135f6eeec4e77105ab55bdd92af56ccca4bbb3154ac4fbb71ac42b5

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e.exe
    "C:\Users\Admin\AppData\Local\Temp\5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe"
      2⤵
      • NTFS ADS
      PID:4440
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3952
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2752
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MsoHtmEd.Exe.log

      Filesize

      1KB

      MD5

      51bf8bf8613f9137624f592c20a96aba

      SHA1

      643c3a00ea78ec4f95fc0b06e23c2be0fcd9f3c7

      SHA256

      5e7f66ef51c6f7c1764fabfa5ad6de78a03b0e8db95c35fc4902d66b20759ae5

      SHA512

      b0aeb08775757582fb0cde8dcb73b0922196fab16cae5cc86381b9a7dca8e43ac135450d1114e9b8db50a54437eafa6986e9283d2f19c4c29ba81f62a1f3fb3a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe

      Filesize

      903KB

      MD5

      88494e93da17c74c2857881b8313507c

      SHA1

      2a35eee7686193af76e9d2e103c2c4a95d7f6de0

      SHA256

      5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e

      SHA512

      4cc65b70760072b498e3eb3eef292b2e5c47baecf92d102331708dff19d6d152d0a262114135f6eeec4e77105ab55bdd92af56ccca4bbb3154ac4fbb71ac42b5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe

      Filesize

      903KB

      MD5

      88494e93da17c74c2857881b8313507c

      SHA1

      2a35eee7686193af76e9d2e103c2c4a95d7f6de0

      SHA256

      5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e

      SHA512

      4cc65b70760072b498e3eb3eef292b2e5c47baecf92d102331708dff19d6d152d0a262114135f6eeec4e77105ab55bdd92af56ccca4bbb3154ac4fbb71ac42b5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsoHtmEd.Exe

      Filesize

      903KB

      MD5

      88494e93da17c74c2857881b8313507c

      SHA1

      2a35eee7686193af76e9d2e103c2c4a95d7f6de0

      SHA256

      5951cd18ad1dc3b712826bbce265819abb332cb093b066c4a9ce562ffeabd87e

      SHA512

      4cc65b70760072b498e3eb3eef292b2e5c47baecf92d102331708dff19d6d152d0a262114135f6eeec4e77105ab55bdd92af56ccca4bbb3154ac4fbb71ac42b5

    • memory/1452-144-0x0000000006D10000-0x0000000006DAC000-memory.dmp

      Filesize

      624KB

    • memory/2480-135-0x0000000005310000-0x00000000054D2000-memory.dmp

      Filesize

      1.8MB

    • memory/2480-137-0x0000000006260000-0x0000000006804000-memory.dmp

      Filesize

      5.6MB

    • memory/2480-130-0x0000000000520000-0x0000000000608000-memory.dmp

      Filesize

      928KB

    • memory/2480-134-0x0000000004F50000-0x0000000004F72000-memory.dmp

      Filesize

      136KB

    • memory/2480-133-0x00000000050A0000-0x0000000005132000-memory.dmp

      Filesize

      584KB

    • memory/2480-132-0x0000000004F90000-0x0000000004FF6000-memory.dmp

      Filesize

      408KB

    • memory/2480-131-0x0000000004EF0000-0x0000000004F12000-memory.dmp

      Filesize

      136KB

    • memory/2752-146-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2752-149-0x0000000008020000-0x000000000802A000-memory.dmp

      Filesize

      40KB