Analysis

  • max time kernel
    148s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:41

General

  • Target

    accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe

  • Size

    219KB

  • MD5

    d154727bddfc75dd04277ae55042361c

  • SHA1

    9d1caeaa620733c6bd3e74d32134d09e0a152362

  • SHA256

    accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6

  • SHA512

    eb489b976e9ec2bd5456afa6092fae61c27e6374629f69c4bf48ac91391c66fda746bc0eaf70f9e0a3f38e1717c0c7b63e0bd62b44eb14a29ea0cedd209e6e41

  • SSDEEP

    6144:NfNcifI8JIMGHWqH4Xhr1WV0/wX5PZAlUcBMRGjZM1+uvx:Nfl5JIMGfyhB4JALC3vx

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
    "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\connection.vbs
      2⤵
        PID:2040
      • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
        "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1728
      • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
        "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
        2⤵
          PID:964
        • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
          "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
          2⤵
            PID:1924
          • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
            "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
            2⤵
              PID:1548
            • C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe
              "C:\Users\Admin\AppData\Local\Temp\accf9e298270f1d687f9e5977dde2712bf80146e34272ac308bda351dfbb41e6.exe"
              2⤵
                PID:1168
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:1040
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\connection.vbs"
                2⤵
                • Adds Run key to start application
                PID:968

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\connection.vbs

              Filesize

              601B

              MD5

              6fa52d7ada11cbcd219093a2bf9a1dc4

              SHA1

              eb6e5fde647eb1ffc31c8d8a661192d13290a632

              SHA256

              017edfcc9efe3252433a245a24138695470fa0de6d312070cc7cb606c1a23937

              SHA512

              70fb1fc938020da3c8cd8a4808c1977fd89b323da89bdf77ec73103b3b4ff45b9af7b447290d999aadeae7cb7309453c4efb415b527166e3d19b7300900b35d5

            • memory/964-131-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1040-71-0x000007FEFB771000-0x000007FEFB773000-memory.dmp

              Filesize

              8KB

            • memory/1456-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

              Filesize

              8KB

            • memory/1456-55-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1456-166-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1456-96-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1728-86-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-69-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-60-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-64-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-75-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-76-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-77-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-79-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-80-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-81-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-83-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-85-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-67-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-89-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-92-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-91-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-78-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-63-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-94-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-95-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1728-62-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1728-97-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/1728-59-0x0000000000400000-0x0000000000460000-memory.dmp

              Filesize

              384KB

            • memory/1924-165-0x0000000073EB0000-0x000000007445B000-memory.dmp

              Filesize

              5.7MB

            • memory/2040-58-0x00000000715A1000-0x00000000715A3000-memory.dmp

              Filesize

              8KB