Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:14

General

  • Target

    c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95.exe

  • Size

    352KB

  • MD5

    6120e5e74937174530953b8b465e262e

  • SHA1

    c4eed2041c3fd371b945b46bf2c1a8c008139f1b

  • SHA256

    c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95

  • SHA512

    0417beb2dea331199a57a01b4c8169c52bc6e4475975fd726664395e02b9ac012e54d19ec991fa72745116d636ebc2c7ebcba07f0da6129f24cf2207b509ca3e

  • SSDEEP

    6144:gRaO5ZNlcj2iMDMmeY0ixpeQRokqmnQw1ToomRPX/sSMPXOkNp0QHkBAYn8V:5wcaDMmeY7xpbtnh16RPXElPXOkNaqMn

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95.exe
    "C:\Users\Admin\AppData\Local\Temp\c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\winlogon.exe
      "C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\winlogon.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1040
      • C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\csrss.exe
        "C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\csrss.exe" -reg C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\winlogon.exe -proc 1040 C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\csrss.exe

    Filesize

    352KB

    MD5

    6120e5e74937174530953b8b465e262e

    SHA1

    c4eed2041c3fd371b945b46bf2c1a8c008139f1b

    SHA256

    c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95

    SHA512

    0417beb2dea331199a57a01b4c8169c52bc6e4475975fd726664395e02b9ac012e54d19ec991fa72745116d636ebc2c7ebcba07f0da6129f24cf2207b509ca3e

  • C:\Users\Admin\AppData\Roaming\LeagueofLegend\SubFolder\csrss.exe

    Filesize

    352KB

    MD5

    6120e5e74937174530953b8b465e262e

    SHA1

    c4eed2041c3fd371b945b46bf2c1a8c008139f1b

    SHA256

    c55f22213dda901e2b97ccce6f5e46abd008c7a07eb7fe9ca8ce3c5bcc1dee95

    SHA512

    0417beb2dea331199a57a01b4c8169c52bc6e4475975fd726664395e02b9ac012e54d19ec991fa72745116d636ebc2c7ebcba07f0da6129f24cf2207b509ca3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe

    Filesize

    4KB

    MD5

    88579adcac3be9a8d1c1494a8830c179

    SHA1

    fcd174761aa1f175998a5c138cb9daa6683b9e08

    SHA256

    6e5e3e087015dcc1cc2ec46d93b0132941399728df6bf53956b426c1ed7936d9

    SHA512

    175a5b1cac8abdde709fc0afb88bacc23f06fd1c3a5ac94de9c41ee12ffc25647c355492e037f46b7bbf6ae6ba8f22c2020fe21609a48435afc242bad9279344

  • C:\Users\Admin\AppData\Roaming\Microsoft\winlogon.exe

    Filesize

    4KB

    MD5

    88579adcac3be9a8d1c1494a8830c179

    SHA1

    fcd174761aa1f175998a5c138cb9daa6683b9e08

    SHA256

    6e5e3e087015dcc1cc2ec46d93b0132941399728df6bf53956b426c1ed7936d9

    SHA512

    175a5b1cac8abdde709fc0afb88bacc23f06fd1c3a5ac94de9c41ee12ffc25647c355492e037f46b7bbf6ae6ba8f22c2020fe21609a48435afc242bad9279344

  • memory/1040-60-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-73-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-59-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-64-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-66-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-62-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-82-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1040-71-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1040-81-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1040-75-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/1128-79-0x000007FEF3C50000-0x000007FEF4673000-memory.dmp

    Filesize

    10.1MB

  • memory/1128-80-0x000007FEF2BB0000-0x000007FEF3C46000-memory.dmp

    Filesize

    16.6MB

  • memory/1168-57-0x000007FEF4B30000-0x000007FEF5553000-memory.dmp

    Filesize

    10.1MB

  • memory/1168-58-0x000007FEF2700000-0x000007FEF3796000-memory.dmp

    Filesize

    16.6MB

  • memory/1184-55-0x000007FEF2BB0000-0x000007FEF3C46000-memory.dmp

    Filesize

    16.6MB

  • memory/1184-54-0x000007FEF3C50000-0x000007FEF4673000-memory.dmp

    Filesize

    10.1MB