Analysis

  • max time kernel
    172s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 18:36

General

  • Target

    9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe

  • Size

    350KB

  • MD5

    22a4ca0bb8c69559d1705afcfd19036e

  • SHA1

    1e5a7bd56f9c80ea45c36a15a49cd922c1a4b22b

  • SHA256

    9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f

  • SHA512

    1defcf24711937b3a078a6221189e80ea15788ca0a4274bb0da52708c7af45fb51eda68f78e98e13de189478114f3efef3361f9cc5a3a99df0888b9cb331d374

  • SSDEEP

    6144:K7NnAkDl9Rymx8mni62kJmj5SNw9IQV+REZrHfUT0+2ZXShqL:IXDlTyA8mi69JuXGQV4GHfUT0+2ZCY

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe
    "C:\Users\Admin\AppData\Local\Temp\9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3052-132-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3052-136-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4728-134-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/4728-135-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4728-137-0x0000000074E30000-0x00000000753E1000-memory.dmp

    Filesize

    5.7MB