Analysis

  • max time kernel
    149s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 13:43

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2032
    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
      C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        3⤵
          PID:1624
        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:852
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
            4⤵
              PID:1924
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
              4⤵
                PID:1788
              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:920
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                  5⤵
                    PID:1932
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    5⤵
                      PID:1768
                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:484
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                        6⤵
                          PID:1496
                        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:968
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                            7⤵
                              PID:1812

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • memory/484-149-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/484-132-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/484-135-0x0000000002BD0000-0x0000000002CC5000-memory.dmp

                  Filesize

                  980KB

                • memory/484-136-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/484-146-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/484-145-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/852-108-0x0000000003450000-0x0000000003545000-memory.dmp

                  Filesize

                  980KB

                • memory/852-107-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/852-112-0x0000000003450000-0x0000000003545000-memory.dmp

                  Filesize

                  980KB

                • memory/852-96-0x0000000001F30000-0x0000000002025000-memory.dmp

                  Filesize

                  980KB

                • memory/852-97-0x0000000003450000-0x0000000003545000-memory.dmp

                  Filesize

                  980KB

                • memory/852-94-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/916-88-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/916-79-0x0000000003400000-0x00000000034F5000-memory.dmp

                  Filesize

                  980KB

                • memory/916-74-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/916-92-0x0000000003400000-0x00000000034F5000-memory.dmp

                  Filesize

                  980KB

                • memory/916-89-0x0000000003400000-0x00000000034F5000-memory.dmp

                  Filesize

                  980KB

                • memory/916-78-0x0000000001F60000-0x0000000002055000-memory.dmp

                  Filesize

                  980KB

                • memory/920-131-0x00000000034D0000-0x00000000035C5000-memory.dmp

                  Filesize

                  980KB

                • memory/920-127-0x00000000034D0000-0x00000000035C5000-memory.dmp

                  Filesize

                  980KB

                • memory/920-113-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/920-115-0x0000000002020000-0x0000000002115000-memory.dmp

                  Filesize

                  980KB

                • memory/920-116-0x00000000034D0000-0x00000000035C5000-memory.dmp

                  Filesize

                  980KB

                • memory/920-126-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/968-163-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/968-154-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/968-153-0x0000000001F20000-0x0000000002015000-memory.dmp

                  Filesize

                  980KB

                • memory/1264-56-0x0000000001F80000-0x0000000002075000-memory.dmp

                  Filesize

                  980KB

                • memory/1264-72-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1264-67-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1264-55-0x0000000075291000-0x0000000075293000-memory.dmp

                  Filesize

                  8KB

                • memory/1264-57-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1264-54-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1264-66-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1496-144-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1624-87-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1768-125-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1788-106-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1812-162-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2032-63-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/2032-68-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2032-65-0x0000000073C20000-0x00000000741CB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2032-58-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/2032-61-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB