Analysis

  • max time kernel
    158s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 02:41

General

  • Target

    54ce4b3ee7bf8152203aa77fb6acb14c.exe

  • Size

    505KB

  • MD5

    54ce4b3ee7bf8152203aa77fb6acb14c

  • SHA1

    fe555154b24f65d05879aee558f60cdf68905381

  • SHA256

    bb992a2a26463285634e1aba34f188240e861b7ab29bc65e332fa2ebdece4dae

  • SHA512

    f67a0631d4be5c783d9c75a4133462451d0a16216533b413daa68c69bfb0495ea98a234390a4ef2cd9fae9dd4f1e92b95b206d4ba9ca95c5ec3afd09e02999f3

  • SSDEEP

    6144:YRGQ8zpJEijUsysr8nBBdYnLGcRaJNK65gftmoxWBBRurqQ+mnIUomhQarSG8Q86:vjbypvmScRbZtmsW6qloho4ngvJRkZZ

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c.exe
    "C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c\54ce4b3ee7bf8152203aa77fb6acb14c.exe
      "C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c\54ce4b3ee7bf8152203aa77fb6acb14c.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\54ce4b3ee7bf8152203aa77fb6acb14c\54ce4b3ee7bf8152203aa77fb6acb14c.exe

    Filesize

    505KB

    MD5

    54ce4b3ee7bf8152203aa77fb6acb14c

    SHA1

    fe555154b24f65d05879aee558f60cdf68905381

    SHA256

    bb992a2a26463285634e1aba34f188240e861b7ab29bc65e332fa2ebdece4dae

    SHA512

    f67a0631d4be5c783d9c75a4133462451d0a16216533b413daa68c69bfb0495ea98a234390a4ef2cd9fae9dd4f1e92b95b206d4ba9ca95c5ec3afd09e02999f3

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    55B

    MD5

    033d552c7c12e6de0868b70b09b20ed8

    SHA1

    552a55923384e6f0797b41be3cbb3ad95eda2033

    SHA256

    bb89b2ce056a7158bec4876f772b1b91e9302e21c4766adea3eb7921f4df8e99

    SHA512

    5897e58d6050f568bdd712cfa08e0d550007cd1a5bbe99f6ac918b196fff7ec5760271b28b84fb749e30b602baa973a64e4d72084f8d35ff282b3c5c1d22a138

  • memory/2188-21-0x0000000075280000-0x0000000075A30000-memory.dmp

    Filesize

    7.7MB

  • memory/2188-1-0x0000000075280000-0x0000000075A30000-memory.dmp

    Filesize

    7.7MB

  • memory/2188-2-0x0000000004F20000-0x0000000004FBC000-memory.dmp

    Filesize

    624KB

  • memory/2188-3-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/2188-4-0x0000000004E10000-0x0000000004E6E000-memory.dmp

    Filesize

    376KB

  • memory/2188-5-0x0000000004EF0000-0x0000000004F18000-memory.dmp

    Filesize

    160KB

  • memory/2188-6-0x0000000009C30000-0x000000000A1D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2188-0-0x0000000000450000-0x00000000004D4000-memory.dmp

    Filesize

    528KB

  • memory/4960-18-0x0000000075280000-0x0000000075A30000-memory.dmp

    Filesize

    7.7MB

  • memory/4960-24-0x0000000005AF0000-0x0000000005AFE000-memory.dmp

    Filesize

    56KB

  • memory/4960-27-0x0000000005AE0000-0x0000000005AF6000-memory.dmp

    Filesize

    88KB

  • memory/4960-19-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB

  • memory/4960-48-0x0000000075280000-0x0000000075A30000-memory.dmp

    Filesize

    7.7MB

  • memory/4960-51-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB