Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2023 07:47

General

  • Target

    a97144af800ff333f4b8a0361d791087.exe

  • Size

    466KB

  • MD5

    a97144af800ff333f4b8a0361d791087

  • SHA1

    131cef8e8239477f295dfb84a70304d62652bd6b

  • SHA256

    125273103d910e7aec35c4bf75fce7fb0d000eee31b9b5409119f38069dbb722

  • SHA512

    ca61bfb7da94969720f2c54ba5c6b16b151405777612f0c78a17f885e668e8bcb69b45ff35c3fcc07a3bde7911d5956ab5f13640a1a806092803eea0b6cb07bb

  • SSDEEP

    6144:BWylDcksxWe65bf67rHzZ8Ees9gbCKbGHOOJ3Vd6QBOT+VTJQQCklKAmAAcOGRwj:0yGksh8bfUrH2osCKi7kQBOTrE5F9wfL

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe
    "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe
      "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe" & exit
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Roaming\PEVerify.exe
        "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_1D5A876A9113EC07224C45E5A870E3BD

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\Local\Temp\tmp37A.tmp

    Filesize

    381B

    MD5

    1e4a89b11eae0fcf8bb5fdd5ec3b6f61

    SHA1

    4260284ce14278c397aaf6f389c1609b0ab0ce51

    SHA256

    4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df

    SHA512

    8c290919e456a80d87dd6d243e4713945432b9a2bc158bfa5b81ae9fed1a8dd693da51914fa4014c5b8596e36186a9c891741c3b9011958c7ac240b7d818f815

  • C:\Users\Admin\AppData\Roaming\Imminent\PID.dat

    Filesize

    4B

    MD5

    c8067ad1937f728f51288b3eb986afaa

    SHA1

    2773b3399512236d16b9be785202a7232ed84150

    SHA256

    1395d0b76b56509da2cd59c06ca9522cc2b7aff483dcd622b507c21e74613278

    SHA512

    1956f4c604063f0e77d0cd37686f3c9c6f2f797fd62368a2ade7680b351767116e31296304b7d5547788303b05ad7d8d5f87a2d35806432a4e202653c9d81bbd

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    59B

    MD5

    903bc0b85fb3242bd00462af69a6b34e

    SHA1

    20d8d42695d74cae9a05d04978ef79e015fc887c

    SHA256

    e9d122b170c38b2fe8dc1855b347d00cce07c7718d23516ffa9e1a637c6fcb89

    SHA512

    1ed4e6622cf36b361b10446377db746d45d26ce2c89d7ab13451107040d9cb7982cad2a810d23d737d49364c5b762ccfa54c74e6481c5cab70c509c618d119fb

  • C:\Users\Admin\AppData\Roaming\PEVerify.exe

    Filesize

    53KB

    MD5

    6c93f0cc87ec29681dc4c92eed621884

    SHA1

    95c432cabca506dc9ce77d2eb36a820a9c706b2e

    SHA256

    f7a659e450b6f82939e4e48436abff93788bdd41b0a4b34d25d72f24a3e24d1b

    SHA512

    dde8fa67890bdc07deb86b6e10b9cf773ac6bb3f0315de19cc67df2a6443d88d40e2a932a13e357c7d311863a495a88c20b2a034ba0a7862fe76893bf9c6427d

  • memory/820-114-0x0000000000350000-0x0000000000390000-memory.dmp

    Filesize

    256KB

  • memory/820-113-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/820-62-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/820-61-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2052-77-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2052-32-0x0000000001FF0000-0x0000000002030000-memory.dmp

    Filesize

    256KB

  • memory/2052-1-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2052-0-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2052-102-0x0000000001FF0000-0x0000000002030000-memory.dmp

    Filesize

    256KB

  • memory/2052-31-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2052-83-0x0000000004590000-0x0000000004591000-memory.dmp

    Filesize

    4KB

  • memory/2052-81-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2052-79-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2052-2-0x0000000001FF0000-0x0000000002030000-memory.dmp

    Filesize

    256KB

  • memory/2052-75-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2052-74-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2052-65-0x00000000045A0000-0x00000000045A1000-memory.dmp

    Filesize

    4KB

  • memory/2052-70-0x0000000004590000-0x0000000004591000-memory.dmp

    Filesize

    4KB

  • memory/2052-73-0x0000000004580000-0x0000000004589000-memory.dmp

    Filesize

    36KB

  • memory/2476-56-0x00000000000F0000-0x0000000000130000-memory.dmp

    Filesize

    256KB

  • memory/2476-54-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-37-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-39-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-57-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2476-55-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2476-35-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2476-33-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-51-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-103-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2476-106-0x00000000000F0000-0x0000000000130000-memory.dmp

    Filesize

    256KB

  • memory/2476-110-0x0000000074A70000-0x000000007501B000-memory.dmp

    Filesize

    5.7MB

  • memory/2476-44-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB

  • memory/2476-43-0x0000000000070000-0x00000000000C2000-memory.dmp

    Filesize

    328KB