Analysis

  • max time kernel
    149s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 13:40

General

  • Target

    PURCHASE ORDER RFQ_CF-170419S3_.exe

  • Size

    1.1MB

  • MD5

    10e0c2c544c56f8bb1deb536590606ff

  • SHA1

    99a8d3a2bc97c8941d0c78bb655e2d57244706f4

  • SHA256

    77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

  • SHA512

    3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

  • SSDEEP

    24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe
    "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:944
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
          PID:1884
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          2⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1696
        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
            3⤵
              PID:1540
            • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1876
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                4⤵
                  PID:432
                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1352
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    5⤵
                      PID:876
                    • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1240
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                        6⤵
                          PID:240
                        • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          C:\Users\Admin\AppData\Local\Temp\VQwinup.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1008
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                            7⤵
                              PID:824

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\TYboDhwl\VQHHtUoO.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • C:\Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • \Users\Admin\AppData\Local\Temp\VQwinup.exe

                  Filesize

                  1.1MB

                  MD5

                  10e0c2c544c56f8bb1deb536590606ff

                  SHA1

                  99a8d3a2bc97c8941d0c78bb655e2d57244706f4

                  SHA256

                  77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d

                  SHA512

                  3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea

                • memory/240-145-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/432-106-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/824-164-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/824-165-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/876-125-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/876-126-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1008-155-0x0000000001ED0000-0x0000000001FC5000-memory.dmp

                  Filesize

                  980KB

                • memory/1008-152-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1008-156-0x0000000003360000-0x0000000003455000-memory.dmp

                  Filesize

                  980KB

                • memory/1240-146-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1240-151-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1240-147-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1240-136-0x0000000003410000-0x0000000003505000-memory.dmp

                  Filesize

                  980KB

                • memory/1240-135-0x0000000001F00000-0x0000000001FF5000-memory.dmp

                  Filesize

                  980KB

                • memory/1240-133-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1352-113-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1352-117-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1352-132-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1352-128-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1352-127-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1352-116-0x0000000001F90000-0x0000000002085000-memory.dmp

                  Filesize

                  980KB

                • memory/1540-87-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1696-65-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1696-58-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/1696-63-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/1696-61-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/1696-68-0x0000000073A10000-0x0000000073FBB000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1876-107-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1876-108-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1876-112-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1876-97-0x0000000003440000-0x0000000003535000-memory.dmp

                  Filesize

                  980KB

                • memory/1876-96-0x0000000002C00000-0x0000000002CF5000-memory.dmp

                  Filesize

                  980KB

                • memory/1876-94-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1976-67-0x00000000033E0000-0x00000000034D5000-memory.dmp

                  Filesize

                  980KB

                • memory/1976-66-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1976-55-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

                  Filesize

                  8KB

                • memory/1976-56-0x0000000001F50000-0x0000000002045000-memory.dmp

                  Filesize

                  980KB

                • memory/1976-57-0x00000000033E0000-0x00000000034D5000-memory.dmp

                  Filesize

                  980KB

                • memory/1976-54-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/1976-72-0x00000000033E0000-0x00000000034D5000-memory.dmp

                  Filesize

                  980KB

                • memory/2016-74-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2016-77-0x0000000001F70000-0x0000000002065000-memory.dmp

                  Filesize

                  980KB

                • memory/2016-93-0x0000000003430000-0x0000000003525000-memory.dmp

                  Filesize

                  980KB

                • memory/2016-78-0x0000000003430000-0x0000000003525000-memory.dmp

                  Filesize

                  980KB

                • memory/2016-88-0x0000000000400000-0x00000000004FF000-memory.dmp

                  Filesize

                  1020KB

                • memory/2016-89-0x0000000003430000-0x0000000003525000-memory.dmp

                  Filesize

                  980KB