Analysis

  • max time kernel
    266s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 01:17

General

  • Target

    fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

  • Size

    282KB

  • MD5

    5a01389f7ff9377d4989af22abb57e48

  • SHA1

    6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

  • SHA256

    fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

  • SHA512

    4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

  • SSDEEP

    6144:i/LFWA8yi6hcfX/uxlrWxM1WyxnlVUO7gHB89ULeuEwLTRGS:AVi2cfXmxdyMLxlX7gh8QpLToS

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
    "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs
      2⤵
        PID:1576
      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
        "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
          "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1612
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs
            4⤵
              PID:2032
            • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
              "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1736
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:860
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 1000
              4⤵
              • Runs ping.exe
              PID:108
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"
          2⤵
          • Adds Run key to start application
          PID:1704
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"
          2⤵
          • Adds Run key to start application
          PID:1168

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Roaming\LdKhI.vbs

        Filesize

        666B

        MD5

        409fa21abfcd0486ea2b40807dc4ee6f

        SHA1

        eb165dbd4008c565b0cc1ad5c2fc88cc81d733c0

        SHA256

        18164c48099a23dd02f6f37f7af77c7a1703229f36e935aba66952452f5e3cd6

        SHA512

        16307be496bee370234c767ef753fcf87de854a07adbd323c7a5701a4c1bc9b89466eba738aa414a50893d293fdd0afcc15908d50182b5a150db116e49911108

      • C:\Users\Admin\AppData\Roaming\LdKhI.vbs

        Filesize

        601B

        MD5

        dea7c7ae2418179645707fe811ccf502

        SHA1

        6f47a206259e8ae0d21bee77e6eae21ec5159570

        SHA256

        afc65a741eba6a07a9184dd8b28baf24832eb3c1c98df223a6f1437c2ee0f964

        SHA512

        b75054d74129b04cb97bf953238693dec713c32588c3128f24b053d70456a38109f0b350c717284b8e49ec0c83adeab4ac1280641ddaa6edb66d1585c8dc3282

      • C:\Users\Admin\AppData\Roaming\Windows Utilizer.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • \Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • \Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • \Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • memory/1044-55-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1044-56-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1044-54-0x0000000076931000-0x0000000076933000-memory.dmp

        Filesize

        8KB

      • memory/1400-84-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1400-66-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-61-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-67-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-60-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-73-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-68-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-71-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/1400-75-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1576-59-0x0000000072F11000-0x0000000072F13000-memory.dmp

        Filesize

        8KB

      • memory/1612-106-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-85-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1668-63-0x000007FEFC0B1000-0x000007FEFC0B3000-memory.dmp

        Filesize

        8KB

      • memory/1736-107-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/1736-109-0x0000000074BD0000-0x000000007517B000-memory.dmp

        Filesize

        5.7MB

      • memory/2032-98-0x0000000072CA1000-0x0000000072CA3000-memory.dmp

        Filesize

        8KB