Analysis

  • max time kernel
    149s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 15:55

General

  • Target

    a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe

  • Size

    452KB

  • MD5

    88140b8a47b523da3f16de466e6ddbd7

  • SHA1

    889dfdd52e48616862f48428e5fcb145d9a88255

  • SHA256

    a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635

  • SHA512

    d6e7fe3dbbf75745ec4da3371051d3b12a0677f8d20b28487b9ba017c19be758d561434ff8b6be1def6984fb5c83646d44f8b9d0ea09e2aa96d5eef6bb399452

  • SSDEEP

    12288:KFhlFYQMvgPhzLuvBszuKmx+Dj3Avzxenf4/41:KrlyQJzLuQu/+/3Yzxenf4g

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
    "C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
      "C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1264
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"
        3⤵
        • Modifies WinLogon for persistence
        PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1264-63-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-58-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-59-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-61-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-62-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-75-0x0000000074380000-0x000000007492B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-70-0x0000000074380000-0x000000007492B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-66-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1264-68-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1724-57-0x0000000074380000-0x000000007492B000-memory.dmp

    Filesize

    5.7MB

  • memory/1724-56-0x0000000001FD5000-0x0000000001FE6000-memory.dmp

    Filesize

    68KB

  • memory/1724-55-0x0000000074380000-0x000000007492B000-memory.dmp

    Filesize

    5.7MB

  • memory/1724-74-0x0000000001FD5000-0x0000000001FE6000-memory.dmp

    Filesize

    68KB

  • memory/1724-73-0x0000000074380000-0x000000007492B000-memory.dmp

    Filesize

    5.7MB

  • memory/1724-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB