Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 13:36

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:1632
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
          PID:916
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          2⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:996
        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
            3⤵
              PID:1648
            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1772
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                4⤵
                  PID:1400
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                  4⤵
                    PID:1928
                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                    C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:432
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                      5⤵
                        PID:1144
                      • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1460
                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                          6⤵
                            PID:1380
                          • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                            C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1676
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                              7⤵
                                PID:1092

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\TYboDhwl\VQHHtUoO.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\TYboDhwl\VQHHtUoO.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\TYboDhwl\VQHHtUoO.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\TYboDhwl\VQHHtUoO.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\TYboDhwl\VQHHtUoO.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                    Filesize

                    1.1MB

                    MD5

                    10e0c2c544c56f8bb1deb536590606ff

                    SHA1

                    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                    SHA256

                    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                    SHA512

                    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                  • memory/108-67-0x00000000034E0000-0x00000000035D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/108-66-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/108-55-0x0000000075B41000-0x0000000075B43000-memory.dmp

                    Filesize

                    8KB

                  • memory/108-56-0x0000000001FE0000-0x00000000020D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/108-73-0x00000000034E0000-0x00000000035D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/108-57-0x00000000034E0000-0x00000000035D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/108-54-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/432-118-0x00000000033E0000-0x00000000034D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/432-117-0x0000000001F20000-0x0000000002015000-memory.dmp

                    Filesize

                    980KB

                  • memory/432-114-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/432-131-0x00000000033E0000-0x00000000034D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/432-127-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/432-128-0x00000000033E0000-0x00000000034D5000-memory.dmp

                    Filesize

                    980KB

                  • memory/996-58-0x0000000000400000-0x000000000045A000-memory.dmp

                    Filesize

                    360KB

                  • memory/996-61-0x0000000000400000-0x000000000045A000-memory.dmp

                    Filesize

                    360KB

                  • memory/996-68-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/996-63-0x0000000000400000-0x000000000045A000-memory.dmp

                    Filesize

                    360KB

                  • memory/996-65-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1092-165-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1092-164-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1144-126-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1164-74-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1164-93-0x00000000033F0000-0x00000000034E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1164-77-0x0000000002BB0000-0x0000000002CA5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1164-78-0x00000000033F0000-0x00000000034E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1164-89-0x00000000033F0000-0x00000000034E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1164-88-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1380-145-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1460-133-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1460-146-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1460-147-0x0000000003530000-0x0000000003625000-memory.dmp

                    Filesize

                    980KB

                  • memory/1460-135-0x0000000002DA0000-0x0000000002E95000-memory.dmp

                    Filesize

                    980KB

                  • memory/1460-136-0x0000000003530000-0x0000000003625000-memory.dmp

                    Filesize

                    980KB

                  • memory/1460-150-0x0000000003530000-0x0000000003625000-memory.dmp

                    Filesize

                    980KB

                  • memory/1648-87-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1676-156-0x0000000003470000-0x0000000003565000-memory.dmp

                    Filesize

                    980KB

                  • memory/1676-155-0x0000000002CE0000-0x0000000002DD5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1676-152-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1772-113-0x00000000034F0000-0x00000000035E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1772-98-0x00000000034F0000-0x00000000035E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1772-96-0x0000000002CB0000-0x0000000002DA5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1772-94-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1772-107-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1772-108-0x00000000034F0000-0x00000000035E5000-memory.dmp

                    Filesize

                    980KB

                  • memory/1772-111-0x00000000039C0000-0x0000000003ABF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/1928-106-0x0000000074450000-0x00000000749FB000-memory.dmp

                    Filesize

                    5.7MB