Analysis

  • max time kernel
    204s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 01:17

General

  • Target

    fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

  • Size

    282KB

  • MD5

    5a01389f7ff9377d4989af22abb57e48

  • SHA1

    6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

  • SHA256

    fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

  • SHA512

    4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

  • SSDEEP

    6144:i/LFWA8yi6hcfX/uxlrWxM1WyxnlVUO7gHB89ULeuEwLTRGS:AVi2cfXmxdyMLxlX7gh8QpLToS

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
    "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs
      2⤵
        PID:2808
      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
        "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3404
        • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
          "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
            "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops desktop.ini file(s)
            • Drops file in Windows directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4396
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs
            4⤵
              PID:4804
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3880
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 1000
              4⤵
              • Runs ping.exe
              PID:836
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"
          2⤵
          • Adds Run key to start application
          PID:1416
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"
          2⤵
          • Adds Run key to start application
          PID:2336

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe.log

        Filesize

        319B

        MD5

        da4fafeffe21b7cb3a8c170ca7911976

        SHA1

        50ef77e2451ab60f93f4db88325b897d215be5ad

        SHA256

        7341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7

        SHA512

        0bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • C:\Users\Admin\AppData\Roaming\LdKhI.vbs

        Filesize

        601B

        MD5

        dea7c7ae2418179645707fe811ccf502

        SHA1

        6f47a206259e8ae0d21bee77e6eae21ec5159570

        SHA256

        afc65a741eba6a07a9184dd8b28baf24832eb3c1c98df223a6f1437c2ee0f964

        SHA512

        b75054d74129b04cb97bf953238693dec713c32588c3128f24b053d70456a38109f0b350c717284b8e49ec0c83adeab4ac1280641ddaa6edb66d1585c8dc3282

      • C:\Users\Admin\AppData\Roaming\LdKhI.vbs

        Filesize

        666B

        MD5

        409fa21abfcd0486ea2b40807dc4ee6f

        SHA1

        eb165dbd4008c565b0cc1ad5c2fc88cc81d733c0

        SHA256

        18164c48099a23dd02f6f37f7af77c7a1703229f36e935aba66952452f5e3cd6

        SHA512

        16307be496bee370234c767ef753fcf87de854a07adbd323c7a5701a4c1bc9b89466eba738aa414a50893d293fdd0afcc15908d50182b5a150db116e49911108

      • C:\Users\Admin\AppData\Roaming\Windows Utilizer.exe

        Filesize

        282KB

        MD5

        5a01389f7ff9377d4989af22abb57e48

        SHA1

        6e5b77d5d7969a6640a30e0252b92b3bc4df11a5

        SHA256

        fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71

        SHA512

        4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa

      • memory/1528-133-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/1528-132-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/1556-146-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/1556-147-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/3404-136-0x0000000000400000-0x000000000044A000-memory.dmp

        Filesize

        296KB

      • memory/3404-144-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/3404-140-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/4396-153-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB

      • memory/4396-157-0x0000000074A20000-0x0000000074FD1000-memory.dmp

        Filesize

        5.7MB