Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 13:39

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4288
    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
      C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        3⤵
          PID:212
        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4324
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
            4⤵
              PID:4228
            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2988
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                5⤵
                  PID:780
                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4044
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    6⤵
                      PID:1768
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                      6⤵
                        PID:2540
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                        6⤵
                          PID:4332
                        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:2248
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                            7⤵
                              PID:4328
                            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                              C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                              7⤵
                              • Executes dropped EXE
                              PID:3068

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\regasm.exe.log

                  Filesize

                  319B

                  MD5

                  824ba7b7eed8b900a98dd25129c4cd83

                  SHA1

                  54478770b2158000ef365591d42977cb854453a1

                  SHA256

                  d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03

                  SHA512

                  ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • memory/212-152-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/212-151-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/780-178-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1972-148-0x00000000033B0000-0x00000000034A5000-memory.dmp

                  Filesize

                  980KB

                • memory/1972-153-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1972-154-0x00000000033B0000-0x00000000034A5000-memory.dmp

                  Filesize

                  980KB

                • memory/1972-147-0x0000000002B50000-0x0000000002C45000-memory.dmp

                  Filesize

                  980KB

                • memory/1972-145-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1972-157-0x00000000033B0000-0x00000000034A5000-memory.dmp

                  Filesize

                  980KB

                • memory/2248-199-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2248-203-0x0000000002B70000-0x0000000002C65000-memory.dmp

                  Filesize

                  980KB

                • memory/2248-204-0x0000000003310000-0x0000000003405000-memory.dmp

                  Filesize

                  980KB

                • memory/2248-206-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2248-209-0x0000000003310000-0x0000000003405000-memory.dmp

                  Filesize

                  980KB

                • memory/2988-183-0x0000000003370000-0x0000000003465000-memory.dmp

                  Filesize

                  980KB

                • memory/2988-180-0x0000000003370000-0x0000000003465000-memory.dmp

                  Filesize

                  980KB

                • memory/2988-179-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2988-175-0x0000000003370000-0x0000000003465000-memory.dmp

                  Filesize

                  980KB

                • memory/2988-172-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2988-174-0x0000000002B20000-0x0000000002C15000-memory.dmp

                  Filesize

                  980KB

                • memory/4044-184-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4044-186-0x0000000003010000-0x0000000003105000-memory.dmp

                  Filesize

                  980KB

                • memory/4044-195-0x0000000003010000-0x0000000003105000-memory.dmp

                  Filesize

                  980KB

                • memory/4044-198-0x0000000003010000-0x0000000003105000-memory.dmp

                  Filesize

                  980KB

                • memory/4044-185-0x00000000027D0000-0x00000000028C5000-memory.dmp

                  Filesize

                  980KB

                • memory/4044-192-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4228-166-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4228-165-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4288-137-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4288-136-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/4288-140-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4324-164-0x0000000003350000-0x0000000003445000-memory.dmp

                  Filesize

                  980KB

                • memory/4324-168-0x0000000002AF0000-0x0000000002BE5000-memory.dmp

                  Filesize

                  980KB

                • memory/4324-167-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4324-158-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4324-171-0x0000000003350000-0x0000000003445000-memory.dmp

                  Filesize

                  980KB

                • memory/4324-159-0x0000000002AF0000-0x0000000002BE5000-memory.dmp

                  Filesize

                  980KB

                • memory/4328-205-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4332-193-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4332-194-0x00000000747B0000-0x0000000074D61000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4884-144-0x0000000003530000-0x0000000003625000-memory.dmp

                  Filesize

                  980KB

                • memory/4884-138-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4884-139-0x0000000003530000-0x0000000003625000-memory.dmp

                  Filesize

                  980KB

                • memory/4884-132-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/4884-134-0x0000000003530000-0x0000000003625000-memory.dmp

                  Filesize

                  980KB

                • memory/4884-133-0x0000000002D90000-0x0000000002E85000-memory.dmp

                  Filesize

                  980KB