Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2024 00:12

General

  • Target

    59c5cb3570cb24fabecd0675b81255f0.exe

  • Size

    315KB

  • MD5

    59c5cb3570cb24fabecd0675b81255f0

  • SHA1

    efaebb4328c3753bb02075ba768b1d1ab0d76bfc

  • SHA256

    32ad611697fbd9c7dbe438fa7e0f2a4d7c59edbc21ac668741f276a747016c4f

  • SHA512

    45b4dedfbec5107bf661b206ad40bc7c2d3d171751225abff913ebb2192cb4372b850d1eeecc20115b8f1ce23a84d56aee0ede141a401d9d08b4b2ed59856dfa

  • SSDEEP

    6144:/dL4Z3U5O08lC1/rOFh5rboJHDwoqFoNaVFqa5p3jqkXHFxSEnZts:/F4Z3n08WrQ3r6w5os3OkXlxS7

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0.exe
    "C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:2440
    • C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0\59c5cb3570cb24fabecd0675b81255f0.exe
      "C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0\59c5cb3570cb24fabecd0675b81255f0.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0\59c5cb3570cb24fabecd0675b81255f0.exe

    Filesize

    126KB

    MD5

    4970ff05fec82af7d69044cd19a291c9

    SHA1

    eb7f60aec6e81ac1c8776e95ea73d00b7d4f34df

    SHA256

    00e674fec6b112153ed74e5454cb989f5cb2094a322196c53191fd94b7f5803f

    SHA512

    c54f38ccd4e8bc505c8024c47d505bd2740d6fe0232fdf06602e9b60c256f9168564e3803d8c85824a28e701d753eabbe870aceb35b10ac6abcf77f3da661412

  • C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0\59c5cb3570cb24fabecd0675b81255f0.exe

    Filesize

    213KB

    MD5

    e1dec1108fa27ac4066f18e94dda1ecf

    SHA1

    ecd46d704f8edaedc89ea6c5e36452cce054420b

    SHA256

    8385cd91a8ba19b7d1eb5ccdfa65f3f794fbb437de20cc9f9896aaff35912a38

    SHA512

    e46a1ca9d3de7c48fea44f430fb69e2b8c2f1487203f5991f2b72f2038bee3867b128bb08d1c7cc5cb1221ac2317f1e6a28a72cf04e7ab8cd00d0f5fbbc63e8b

  • C:\Users\Admin\AppData\Local\Temp\59c5cb3570cb24fabecd0675b81255f0\59c5cb3570cb24fabecd0675b81255f0.exe

    Filesize

    251KB

    MD5

    6a9ab5836c04975f8db3be02145b4162

    SHA1

    33ff00ab07ed0ac70b2de2bb5a45a07394a05ffb

    SHA256

    b5e713e6562754e99720060f03946a91a894dcbb1514ab27669c7714f68b7076

    SHA512

    14fe1dd86a4c0ac997b6071a4e3b289d43449b72bf870c2ee08434f25a7c5ca3b38e83517b9247b7b6effcdda604adf1808422987482ac8b2a3502273ad281e4

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    48B

    MD5

    bd4b58aca703e38b7155b9087a885a09

    SHA1

    11ad89b4608c0e0756d3616239c034072e82df32

    SHA256

    840b600bd58fe1c0aaec1830c224a6800ff616f48b80bbde7cb9383334684777

    SHA512

    ecbfe9f1c8d36ab4b282e6017b1ef5933d0c3e5d93e401176f2cf71b73b282655cef44dff20fe157e18ea7a493f1f3cd78cad539e4d23eaa5ce26bafd9e6d97f

  • memory/3900-26-0x0000000001350000-0x000000000135E000-memory.dmp

    Filesize

    56KB

  • memory/3900-30-0x000000001C580000-0x000000001C58C000-memory.dmp

    Filesize

    48KB

  • memory/3900-57-0x0000000001360000-0x0000000001370000-memory.dmp

    Filesize

    64KB

  • memory/3900-56-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/3900-31-0x000000001C570000-0x000000001C586000-memory.dmp

    Filesize

    88KB

  • memory/3900-22-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/3900-19-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/3900-20-0x0000000001360000-0x0000000001370000-memory.dmp

    Filesize

    64KB

  • memory/5044-23-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-3-0x000000001B3D0000-0x000000001B4F2000-memory.dmp

    Filesize

    1.1MB

  • memory/5044-2-0x0000000000E40000-0x0000000000E50000-memory.dmp

    Filesize

    64KB

  • memory/5044-0-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-5-0x000000001BF70000-0x000000001C016000-memory.dmp

    Filesize

    664KB

  • memory/5044-4-0x00007FFB6AEE0000-0x00007FFB6B881000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-1-0x000000001B9F0000-0x000000001BEBE000-memory.dmp

    Filesize

    4.8MB

  • memory/5044-7-0x000000001C0D0000-0x000000001C0F8000-memory.dmp

    Filesize

    160KB

  • memory/5044-6-0x000000001C130000-0x000000001C18E000-memory.dmp

    Filesize

    376KB