Analysis

  • max time kernel
    187s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 03:23

General

  • Target

    fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe

  • Size

    645KB

  • MD5

    398a75ee8a26f0ef0a9cfad14291c3af

  • SHA1

    6c515db9557f3256e681fda198cb45c034d01658

  • SHA256

    fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8

  • SHA512

    e3beddb7435300d413ea11edaad14359ea6e262e8cdc201d260a832cf6b4f0c62259a996248337f15b57ca76a19a7ef2a984683461dd6620deb64998a3c246b6

  • SSDEEP

    12288:dXrWlNSpKL/HaQ/82Q3E4RSDnDiLs4C4a7rHNEu34RC2bjpZJYD:duSgLCQ/8H3E4RSbme7rF34RC2FYD

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe
    "C:\Users\Admin\AppData\Local\Temp\fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe
      "C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe
        "C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe" -reg C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe -proc 1228 C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe

    Filesize

    645KB

    MD5

    398a75ee8a26f0ef0a9cfad14291c3af

    SHA1

    6c515db9557f3256e681fda198cb45c034d01658

    SHA256

    fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8

    SHA512

    e3beddb7435300d413ea11edaad14359ea6e262e8cdc201d260a832cf6b4f0c62259a996248337f15b57ca76a19a7ef2a984683461dd6620deb64998a3c246b6

  • C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe

    Filesize

    645KB

    MD5

    398a75ee8a26f0ef0a9cfad14291c3af

    SHA1

    6c515db9557f3256e681fda198cb45c034d01658

    SHA256

    fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8

    SHA512

    e3beddb7435300d413ea11edaad14359ea6e262e8cdc201d260a832cf6b4f0c62259a996248337f15b57ca76a19a7ef2a984683461dd6620deb64998a3c246b6

  • memory/632-55-0x000007FEF2BB0000-0x000007FEF3C46000-memory.dmp

    Filesize

    16.6MB

  • memory/632-56-0x0000000002036000-0x0000000002055000-memory.dmp

    Filesize

    124KB

  • memory/632-57-0x000007FEFBF91000-0x000007FEFBF93000-memory.dmp

    Filesize

    8KB

  • memory/632-59-0x0000000002036000-0x0000000002055000-memory.dmp

    Filesize

    124KB

  • memory/632-54-0x000007FEF3C50000-0x000007FEF4673000-memory.dmp

    Filesize

    10.1MB

  • memory/1228-60-0x000007FEF3C50000-0x000007FEF4673000-memory.dmp

    Filesize

    10.1MB

  • memory/1228-62-0x0000000001FD6000-0x0000000001FF5000-memory.dmp

    Filesize

    124KB

  • memory/1228-64-0x0000000001FD6000-0x0000000001FF5000-memory.dmp

    Filesize

    124KB

  • memory/1228-61-0x000007FEF2BB0000-0x000007FEF3C46000-memory.dmp

    Filesize

    16.6MB

  • memory/1780-68-0x000007FEF3C50000-0x000007FEF4673000-memory.dmp

    Filesize

    10.1MB

  • memory/1780-69-0x000007FEF2BB0000-0x000007FEF3C46000-memory.dmp

    Filesize

    16.6MB