Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 17:53

General

  • Target

    489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe

  • Size

    354KB

  • MD5

    dc71196d2a323ed8baa10a9f9020bf63

  • SHA1

    2689fb029e204c726492a8d0bdf4734bca903a3a

  • SHA256

    489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777

  • SHA512

    0dcd378b8d07bbd8c1e65c38c270034cde8f53e05b51410d2a91be8f70ae8a8265b16134974dea4ea600b0a5f01e10736b608252e337e9be79b0c729322b414f

  • SSDEEP

    3072:cwi51kpjgUdkY8NveKhBAauYuZKLWV+XKiPjnNGq4HikkSK7EycrTSyak8wrQZbe:YopjgUqY8kolWVQp7LAn819vDROyErZ

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe
    "C:\Users\Admin\AppData\Local\Temp\489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-54-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

    Filesize

    8KB

  • memory/748-55-0x00000000744B0000-0x0000000074A5B000-memory.dmp

    Filesize

    5.7MB

  • memory/748-56-0x00000000744B0000-0x0000000074A5B000-memory.dmp

    Filesize

    5.7MB