Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    217s
  • max time network
    228s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 13:37

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:5044
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
          PID:3472
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          2⤵
          • Drops desktop.ini file(s)
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:232
        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3620
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
            3⤵
              PID:4108
            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2128
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                4⤵
                  PID:2216
                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2576
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    5⤵
                      PID:2008
                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1740

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\TYboDhwl\VQHHtUoO.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\TYboDhwl\VQHHtUoO.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\TYboDhwl\VQHHtUoO.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\TYboDhwl\VQHHtUoO.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\regasm.exe.log

              Filesize

              319B

              MD5

              824ba7b7eed8b900a98dd25129c4cd83

              SHA1

              54478770b2158000ef365591d42977cb854453a1

              SHA256

              d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03

              SHA512

              ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e

            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

              Filesize

              1.1MB

              MD5

              10e0c2c544c56f8bb1deb536590606ff

              SHA1

              99a8d3a2bc97c8941d0c78bb655e2d57244706f4

              SHA256

              77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

              SHA512

              3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

            • memory/232-148-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/232-155-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/232-139-0x0000000000400000-0x000000000045A000-memory.dmp

              Filesize

              360KB

            • memory/1740-185-0x0000000002B40000-0x0000000002C35000-memory.dmp

              Filesize

              980KB

            • memory/1740-186-0x0000000003390000-0x0000000003485000-memory.dmp

              Filesize

              980KB

            • memory/1740-188-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/1740-189-0x0000000003390000-0x0000000003485000-memory.dmp

              Filesize

              980KB

            • memory/1740-184-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/2008-179-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/2128-172-0x0000000003360000-0x0000000003455000-memory.dmp

              Filesize

              980KB

            • memory/2128-169-0x0000000003360000-0x0000000003455000-memory.dmp

              Filesize

              980KB

            • memory/2128-168-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/2128-160-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/2128-161-0x0000000002B10000-0x0000000002C05000-memory.dmp

              Filesize

              980KB

            • memory/2128-163-0x0000000003360000-0x0000000003455000-memory.dmp

              Filesize

              980KB

            • memory/2216-167-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/2576-173-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/2576-177-0x0000000002BB0000-0x0000000002CA5000-memory.dmp

              Filesize

              980KB

            • memory/2576-183-0x0000000003350000-0x0000000003445000-memory.dmp

              Filesize

              980KB

            • memory/2576-180-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/2576-178-0x0000000003350000-0x0000000003445000-memory.dmp

              Filesize

              980KB

            • memory/3620-143-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/3620-144-0x0000000002AB0000-0x0000000002BA5000-memory.dmp

              Filesize

              980KB

            • memory/3620-149-0x0000000003300000-0x00000000033F5000-memory.dmp

              Filesize

              980KB

            • memory/3620-153-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/3620-159-0x0000000003300000-0x00000000033F5000-memory.dmp

              Filesize

              980KB

            • memory/3620-156-0x0000000003300000-0x00000000033F5000-memory.dmp

              Filesize

              980KB

            • memory/4108-152-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/4108-154-0x0000000074320000-0x00000000748D1000-memory.dmp

              Filesize

              5.7MB

            • memory/4620-145-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/4620-132-0x0000000000400000-0x00000000004FF000-memory.dmp

              Filesize

              1020KB

            • memory/4620-146-0x0000000003460000-0x0000000003555000-memory.dmp

              Filesize

              980KB

            • memory/4620-135-0x0000000003460000-0x0000000003555000-memory.dmp

              Filesize

              980KB

            • memory/4620-134-0x0000000003460000-0x0000000003555000-memory.dmp

              Filesize

              980KB

            • memory/4620-133-0x0000000002C10000-0x0000000002D05000-memory.dmp

              Filesize

              980KB