Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2022 07:43

General

  • Target

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe

  • Size

    272KB

  • MD5

    3995e647a475af3c4462c39fc6ba8c40

  • SHA1

    37c1a1ffc5b21162bc21654a8fd07a8509713d83

  • SHA256

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8

  • SHA512

    612ecf1f3cbe57ccc635fe84603408509104b2644227db2d1d2a0f394c014f015b1d2195b34251568a2024e4f10634ebd18fd0d368b7112cf736549733ea934c

  • SSDEEP

    6144:BP6l7zVEWFobaO8p4yiJ2zJBvjOZRyjfdeENBRvFctlRS:BQ6GRKkrVdpNBRvFII

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe
      "C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:728
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bd7466924f8a069d4978624ded31023

    SHA1

    1b3615dd89f0f87bc9811f4b2e2f95ef0a248da1

    SHA256

    a6d3d8e5425b90902193825b793ecbc1c4009492b399083483f61662cbc11de8

    SHA512

    33447e79cf8332d6922ff8dfb9034a4d0cccc52b9679ae2bdaf3788f69e02f84466e57e5a5b4a53c965828a456946b81455ddaafc332e4960c5984e36da4af62

  • C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe

    Filesize

    272KB

    MD5

    3995e647a475af3c4462c39fc6ba8c40

    SHA1

    37c1a1ffc5b21162bc21654a8fd07a8509713d83

    SHA256

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8

    SHA512

    612ecf1f3cbe57ccc635fe84603408509104b2644227db2d1d2a0f394c014f015b1d2195b34251568a2024e4f10634ebd18fd0d368b7112cf736549733ea934c

  • C:\Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe

    Filesize

    272KB

    MD5

    3995e647a475af3c4462c39fc6ba8c40

    SHA1

    37c1a1ffc5b21162bc21654a8fd07a8509713d83

    SHA256

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8

    SHA512

    612ecf1f3cbe57ccc635fe84603408509104b2644227db2d1d2a0f394c014f015b1d2195b34251568a2024e4f10634ebd18fd0d368b7112cf736549733ea934c

  • \Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe

    Filesize

    272KB

    MD5

    3995e647a475af3c4462c39fc6ba8c40

    SHA1

    37c1a1ffc5b21162bc21654a8fd07a8509713d83

    SHA256

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8

    SHA512

    612ecf1f3cbe57ccc635fe84603408509104b2644227db2d1d2a0f394c014f015b1d2195b34251568a2024e4f10634ebd18fd0d368b7112cf736549733ea934c

  • \Users\Admin\AppData\Local\Temp\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8\b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8.exe

    Filesize

    272KB

    MD5

    3995e647a475af3c4462c39fc6ba8c40

    SHA1

    37c1a1ffc5b21162bc21654a8fd07a8509713d83

    SHA256

    b9c12645403f806b6f53d82fb0fa3e178a19781bfd36d46a622ec2c2454adef8

    SHA512

    612ecf1f3cbe57ccc635fe84603408509104b2644227db2d1d2a0f394c014f015b1d2195b34251568a2024e4f10634ebd18fd0d368b7112cf736549733ea934c

  • memory/728-66-0x0000000075010000-0x00000000755BB000-memory.dmp

    Filesize

    5.7MB

  • memory/728-67-0x0000000075010000-0x00000000755BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1756-55-0x0000000075010000-0x00000000755BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1756-54-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB

  • memory/1756-65-0x0000000075010000-0x00000000755BB000-memory.dmp

    Filesize

    5.7MB