Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 15:14

General

  • Target

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908.exe

  • Size

    362KB

  • MD5

    a8756c76d04c168c55055b85b4322143

  • SHA1

    7c0e2e3c78cb9f81e94a44831116f972bb77f099

  • SHA256

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908

  • SHA512

    776ffab28592e397ec40a10f753a52338813a875680889da8ec3472aa445c253827d667b966e75fdeeb032c237b9b979d347abe6a6386f8488dad0a7cfadf1a4

  • SSDEEP

    6144:85QQDGouQm342k2pdW1/8r4o3xWxa9apddmXc2hjH7Nk9G:z8GoPm342N9rhhuxZsc2hnNk9G

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908.exe
    "C:\Users\Admin\AppData\Local\Temp\b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908.exe
      "C:\Users\Admin\AppData\Local\Temp\b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:696
    • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1252
        • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Imminent\Logs\28-11-2022

    Filesize

    45B

    MD5

    6239075a60967348bcbc253d0976ca6d

    SHA1

    62d9b77ab2764d49a18029d78cfa8723ae19f06f

    SHA256

    3d6b748ffd8ca381fef385d0a9f5ff22e0f81f0524674701edf5242442950781

    SHA512

    fe2c971695e06800a536b0eb67c9748a60913771097dbcaeab955cf8a8cf74238aad54ca342fed03b26f123d2990b8ebf3ed89ab7f5e890b4efbc865a946966e

  • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • C:\Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe

    Filesize

    362KB

    MD5

    a8756c76d04c168c55055b85b4322143

    SHA1

    7c0e2e3c78cb9f81e94a44831116f972bb77f099

    SHA256

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908

    SHA512

    776ffab28592e397ec40a10f753a52338813a875680889da8ec3472aa445c253827d667b966e75fdeeb032c237b9b979d347abe6a6386f8488dad0a7cfadf1a4

  • C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe

    Filesize

    362KB

    MD5

    a8756c76d04c168c55055b85b4322143

    SHA1

    7c0e2e3c78cb9f81e94a44831116f972bb77f099

    SHA256

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908

    SHA512

    776ffab28592e397ec40a10f753a52338813a875680889da8ec3472aa445c253827d667b966e75fdeeb032c237b9b979d347abe6a6386f8488dad0a7cfadf1a4

  • C:\Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe

    Filesize

    362KB

    MD5

    a8756c76d04c168c55055b85b4322143

    SHA1

    7c0e2e3c78cb9f81e94a44831116f972bb77f099

    SHA256

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908

    SHA512

    776ffab28592e397ec40a10f753a52338813a875680889da8ec3472aa445c253827d667b966e75fdeeb032c237b9b979d347abe6a6386f8488dad0a7cfadf1a4

  • \Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • \Users\Admin\AppData\Roaming\Microsoft\AeLookupSvi.exe

    Filesize

    8KB

    MD5

    8b1102e104f0fc7121b4c3f1e247bcf2

    SHA1

    e611b031ff933efba52597130f717afaf961f568

    SHA256

    7371971b042d3632be65dcd2353ef8f6b35870c7b8405af4ca7f0e2d92289791

    SHA512

    91464c5288e84dff67c652856c89024d90f6cdb19fcc7ee537b93e6d9bfb82b88e65b98f0c7855f6af31ed6b94712ff3d2de6aca94fc73101c250c3bff233a16

  • \Users\Admin\AppData\Roaming\Microsoft\ProfSvc.exe

    Filesize

    362KB

    MD5

    a8756c76d04c168c55055b85b4322143

    SHA1

    7c0e2e3c78cb9f81e94a44831116f972bb77f099

    SHA256

    b291b2c8ecab8b28ec8506c39b593cf90f8911053d6215627b4ae53acf16a908

    SHA512

    776ffab28592e397ec40a10f753a52338813a875680889da8ec3472aa445c253827d667b966e75fdeeb032c237b9b979d347abe6a6386f8488dad0a7cfadf1a4

  • memory/696-69-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-86-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/696-72-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-57-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-74-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/696-65-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-58-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-64-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-61-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/696-60-0x0000000000080000-0x00000000000CA000-memory.dmp

    Filesize

    296KB

  • memory/956-114-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/956-111-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1096-89-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1096-87-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1252-110-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1252-113-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1252-101-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1252-103-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1492-91-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1492-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

  • memory/1492-56-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1492-55-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1556-80-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1556-90-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1556-88-0x0000000074F30000-0x00000000754DB000-memory.dmp

    Filesize

    5.7MB