Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 03:23

General

  • Target

    199c3d067000396f0eece639ae58da4a8fdf5107fa5be17d31edcaed13ade905.exe

  • Size

    618KB

  • MD5

    2ffee95ccd3b356cf8f08b845686739b

  • SHA1

    4ca369f3e6457cbb11f0fc3ff8f2969ec7d4f81a

  • SHA256

    199c3d067000396f0eece639ae58da4a8fdf5107fa5be17d31edcaed13ade905

  • SHA512

    0ace2a3219759f93ac56f736f9168de82248dc826c32798c0ecbbba0ed73af5a53e47c8708c5a90618681a42ae4cce35e46c4c2d2ccf0af3ed4c90dcebbe32d8

  • SSDEEP

    12288:MDEpkIjmJk/6Egnp4vVgyMqVQrmvJQ3jyAnWtzaAaRACygQmUIe2nH:1pB7/Lgki5ixCy/zaAaOhX2H

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\199c3d067000396f0eece639ae58da4a8fdf5107fa5be17d31edcaed13ade905.exe
    "C:\Users\Admin\AppData\Local\Temp\199c3d067000396f0eece639ae58da4a8fdf5107fa5be17d31edcaed13ade905.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/628-132-0x00000000747D0000-0x0000000074D81000-memory.dmp

    Filesize

    5.7MB