Analysis

  • max time kernel
    153s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 17:53

General

  • Target

    489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe

  • Size

    354KB

  • MD5

    dc71196d2a323ed8baa10a9f9020bf63

  • SHA1

    2689fb029e204c726492a8d0bdf4734bca903a3a

  • SHA256

    489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777

  • SHA512

    0dcd378b8d07bbd8c1e65c38c270034cde8f53e05b51410d2a91be8f70ae8a8265b16134974dea4ea600b0a5f01e10736b608252e337e9be79b0c729322b414f

  • SSDEEP

    3072:cwi51kpjgUdkY8NveKhBAauYuZKLWV+XKiPjnNGq4HikkSK7EycrTSyak8wrQZbe:YopjgUqY8kolWVQp7LAn819vDROyErZ

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe
    "C:\Users\Admin\AppData\Local\Temp\489a0d32eb0a5fa49d5ea9b2174a1cf5637c9f0ac5c91efab6afa96a507c2777.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2792-132-0x0000000074EA0000-0x0000000075451000-memory.dmp

    Filesize

    5.7MB

  • memory/2792-133-0x0000000074EA0000-0x0000000075451000-memory.dmp

    Filesize

    5.7MB