Analysis

  • max time kernel
    149s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 13:37

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:1216
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:832
      • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
        C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          3⤵
            PID:1620
          • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
            C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1168
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
              4⤵
                PID:748
              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1772
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                  5⤵
                    PID:1440
                  • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                    C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:1052
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                      6⤵
                        PID:1616
                      • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:796
                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                          7⤵
                            PID:1992

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\TYboDhwl\VQHHtUoO.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\TYboDhwl\VQHHtUoO.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\TYboDhwl\VQHHtUoO.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\TYboDhwl\VQHHtUoO.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\TYboDhwl\VQHHtUoO.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                Filesize

                1.1MB

                MD5

                10e0c2c544c56f8bb1deb536590606ff

                SHA1

                99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                SHA256

                77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                SHA512

                3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

              • memory/748-107-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/796-157-0x0000000003500000-0x00000000035F5000-memory.dmp

                Filesize

                980KB

              • memory/796-153-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/796-156-0x0000000002D70000-0x0000000002E65000-memory.dmp

                Filesize

                980KB

              • memory/796-166-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/796-167-0x0000000003500000-0x00000000035F5000-memory.dmp

                Filesize

                980KB

              • memory/832-65-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/832-63-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/832-61-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/832-58-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/832-68-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/1052-134-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1052-152-0x0000000003420000-0x0000000003515000-memory.dmp

                Filesize

                980KB

              • memory/1052-148-0x0000000003420000-0x0000000003515000-memory.dmp

                Filesize

                980KB

              • memory/1052-147-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1052-138-0x0000000003420000-0x0000000003515000-memory.dmp

                Filesize

                980KB

              • memory/1052-137-0x0000000002C90000-0x0000000002D85000-memory.dmp

                Filesize

                980KB

              • memory/1168-114-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1168-109-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1168-98-0x0000000002BB0000-0x0000000002CA5000-memory.dmp

                Filesize

                980KB

              • memory/1168-99-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1168-95-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1168-110-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1340-79-0x00000000033D0000-0x00000000034C5000-memory.dmp

                Filesize

                980KB

              • memory/1340-88-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1340-93-0x00000000038A0000-0x000000000399F000-memory.dmp

                Filesize

                1020KB

              • memory/1340-78-0x0000000001F20000-0x0000000002015000-memory.dmp

                Filesize

                980KB

              • memory/1340-89-0x00000000033D0000-0x00000000034C5000-memory.dmp

                Filesize

                980KB

              • memory/1340-74-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1340-94-0x00000000033D0000-0x00000000034C5000-memory.dmp

                Filesize

                980KB

              • memory/1340-108-0x00000000038A0000-0x000000000399F000-memory.dmp

                Filesize

                1020KB

              • memory/1352-55-0x00000000760A1000-0x00000000760A3000-memory.dmp

                Filesize

                8KB

              • memory/1352-67-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1352-54-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1352-73-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1352-66-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1352-56-0x0000000001EF0000-0x0000000001FE5000-memory.dmp

                Filesize

                980KB

              • memory/1352-57-0x00000000033F0000-0x00000000034E5000-memory.dmp

                Filesize

                980KB

              • memory/1440-127-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/1616-146-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/1620-87-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB

              • memory/1772-118-0x00000000035B0000-0x00000000036A5000-memory.dmp

                Filesize

                980KB

              • memory/1772-115-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1772-133-0x00000000035B0000-0x00000000036A5000-memory.dmp

                Filesize

                980KB

              • memory/1772-117-0x00000000020A0000-0x0000000002195000-memory.dmp

                Filesize

                980KB

              • memory/1772-129-0x00000000035B0000-0x00000000036A5000-memory.dmp

                Filesize

                980KB

              • memory/1772-128-0x0000000000400000-0x00000000004FF000-memory.dmp

                Filesize

                1020KB

              • memory/1992-165-0x00000000741C0000-0x000000007476B000-memory.dmp

                Filesize

                5.7MB