Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2023 02:16

General

  • Target

    b060727680fd2428775032311bb81fa27a610f71e5380e7821907cfba4e10f61.exe

  • Size

    643KB

  • MD5

    ba83b2acfbeeac544bcf2fd9be6cb215

  • SHA1

    1ad54cc803db209ca92fe62083c62ab1cd6fb630

  • SHA256

    b060727680fd2428775032311bb81fa27a610f71e5380e7821907cfba4e10f61

  • SHA512

    ac06fc60b6a56789993a4134db1d551801701b34d7496217aad791c103c1133eceaeca1b6ad543a37982c6b5fcf8d8542fc8eab63ff97e7cb2aa4d5b95143b78

  • SSDEEP

    12288:FWvWgQs+9LZeVI4iQOO7zAiMHWK/a1KPesnWwNnuFBbSEWEEEHnmfY5JdutJRMUH:Cv7iL4iQhHAiMHU

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b060727680fd2428775032311bb81fa27a610f71e5380e7821907cfba4e10f61.exe
    "C:\Users\Admin\AppData\Local\Temp\b060727680fd2428775032311bb81fa27a610f71e5380e7821907cfba4e10f61.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2536
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:3812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2536-0-0x00000000008E0000-0x0000000000988000-memory.dmp

      Filesize

      672KB

    • memory/2536-1-0x0000000074B80000-0x0000000075330000-memory.dmp

      Filesize

      7.7MB

    • memory/2536-2-0x0000000007760000-0x0000000007788000-memory.dmp

      Filesize

      160KB

    • memory/2536-4-0x0000000009A30000-0x0000000009ACC000-memory.dmp

      Filesize

      624KB

    • memory/2536-3-0x0000000005290000-0x00000000052A0000-memory.dmp

      Filesize

      64KB

    • memory/2536-5-0x000000000A080000-0x000000000A624000-memory.dmp

      Filesize

      5.6MB

    • memory/2536-6-0x0000000005630000-0x00000000056C2000-memory.dmp

      Filesize

      584KB

    • memory/2536-7-0x0000000005A80000-0x0000000005AE6000-memory.dmp

      Filesize

      408KB

    • memory/2536-8-0x0000000005FD0000-0x0000000005FE8000-memory.dmp

      Filesize

      96KB

    • memory/2536-10-0x0000000006030000-0x0000000006046000-memory.dmp

      Filesize

      88KB

    • memory/2536-11-0x0000000006220000-0x000000000622A000-memory.dmp

      Filesize

      40KB

    • memory/2536-17-0x0000000074B80000-0x0000000075330000-memory.dmp

      Filesize

      7.7MB

    • memory/2536-18-0x0000000005290000-0x00000000052A0000-memory.dmp

      Filesize

      64KB