Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 13:40

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:3760
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
        • Drops desktop.ini file(s)
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1360
      • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
        C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          3⤵
            PID:4872
          • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
            C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
              4⤵
                PID:1288
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                4⤵
                  PID:4548
                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4032
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    5⤵
                      PID:3044
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                      5⤵
                        PID:2100
                      • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:3632
                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                          6⤵
                            PID:3896
                          • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                            C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:1216
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                              7⤵
                                PID:1684
                              • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                                C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of WriteProcessMemory
                                PID:3608
                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                                  8⤵
                                    PID:3752

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\TYboDhwl\VQHHtUoO.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\regasm.exe.log

                      Filesize

                      319B

                      MD5

                      824ba7b7eed8b900a98dd25129c4cd83

                      SHA1

                      54478770b2158000ef365591d42977cb854453a1

                      SHA256

                      d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03

                      SHA512

                      ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                      Filesize

                      1.1MB

                      MD5

                      10e0c2c544c56f8bb1deb536590606ff

                      SHA1

                      99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                      SHA256

                      77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                      SHA512

                      3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                    • memory/1216-197-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/1216-208-0x00000000033F0000-0x00000000034E5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1216-205-0x00000000033F0000-0x00000000034E5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1216-204-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/1216-200-0x00000000033F0000-0x00000000034E5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1216-199-0x0000000002BB0000-0x0000000002CA5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1304-161-0x00000000032D0000-0x00000000033C5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1304-167-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/1304-158-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/1304-160-0x0000000002A80000-0x0000000002B75000-memory.dmp

                      Filesize

                      980KB

                    • memory/1304-171-0x00000000032D0000-0x00000000033C5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1304-168-0x00000000032D0000-0x00000000033C5000-memory.dmp

                      Filesize

                      980KB

                    • memory/1360-141-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1360-137-0x0000000000400000-0x000000000045A000-memory.dmp

                      Filesize

                      360KB

                    • memory/1360-138-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1684-203-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2100-179-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3608-209-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/3632-192-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/3632-188-0x0000000003380000-0x0000000003475000-memory.dmp

                      Filesize

                      980KB

                    • memory/3632-193-0x0000000003380000-0x0000000003475000-memory.dmp

                      Filesize

                      980KB

                    • memory/3632-196-0x0000000003380000-0x0000000003475000-memory.dmp

                      Filesize

                      980KB

                    • memory/3632-187-0x0000000002BF0000-0x0000000002CE5000-memory.dmp

                      Filesize

                      980KB

                    • memory/3632-185-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/3896-191-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/4032-181-0x0000000003300000-0x00000000033F5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4032-180-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/4032-175-0x0000000003300000-0x00000000033F5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4032-184-0x0000000003300000-0x00000000033F5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4032-173-0x0000000002AA0000-0x0000000002B95000-memory.dmp

                      Filesize

                      980KB

                    • memory/4032-172-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/4548-166-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/4728-154-0x00000000032B0000-0x00000000033A5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4728-157-0x00000000032B0000-0x00000000033A5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4728-153-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/4728-146-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/4728-147-0x0000000002A70000-0x0000000002B65000-memory.dmp

                      Filesize

                      980KB

                    • memory/4728-148-0x00000000032B0000-0x00000000033A5000-memory.dmp

                      Filesize

                      980KB

                    • memory/4872-152-0x0000000074EF0000-0x00000000754A1000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/5100-145-0x00000000034E0000-0x00000000035D5000-memory.dmp

                      Filesize

                      980KB

                    • memory/5100-132-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/5100-140-0x00000000034E0000-0x00000000035D5000-memory.dmp

                      Filesize

                      980KB

                    • memory/5100-139-0x0000000000400000-0x00000000004FF000-memory.dmp

                      Filesize

                      1020KB

                    • memory/5100-134-0x00000000034E0000-0x00000000035D5000-memory.dmp

                      Filesize

                      980KB

                    • memory/5100-133-0x0000000002D40000-0x0000000002E35000-memory.dmp

                      Filesize

                      980KB