Analysis

  • max time kernel
    159s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2022 08:52

General

  • Target

    86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8.exe

  • Size

    426KB

  • MD5

    78ce45061e4eb02f1ecba7f6027fceb2

  • SHA1

    007c03dac41efb63dba336aec8812e05b538c569

  • SHA256

    86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8

  • SHA512

    1451957185e8cd9bbe0686139365aedaa04cb523791b0247f25b48d631c007ced32f0ed7f6e2ec5fea88b2320c18675675a98c1197ae0506614e171b68e08972

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops desktop.ini file(s) 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8.exe
    "C:\Users\Admin\AppData\Local\Temp\86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1120
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:3008

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1120-135-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1120-136-0x0000000075290000-0x0000000075841000-memory.dmp

      Filesize

      5.7MB

    • memory/1120-138-0x0000000075290000-0x0000000075841000-memory.dmp

      Filesize

      5.7MB

    • memory/3500-132-0x0000000075290000-0x0000000075841000-memory.dmp

      Filesize

      5.7MB

    • memory/3500-133-0x0000000075290000-0x0000000075841000-memory.dmp

      Filesize

      5.7MB

    • memory/3500-137-0x0000000075290000-0x0000000075841000-memory.dmp

      Filesize

      5.7MB