Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 14:55

General

  • Target

    a97144af800ff333f4b8a0361d791087.exe

  • Size

    466KB

  • MD5

    a97144af800ff333f4b8a0361d791087

  • SHA1

    131cef8e8239477f295dfb84a70304d62652bd6b

  • SHA256

    125273103d910e7aec35c4bf75fce7fb0d000eee31b9b5409119f38069dbb722

  • SHA512

    ca61bfb7da94969720f2c54ba5c6b16b151405777612f0c78a17f885e668e8bcb69b45ff35c3fcc07a3bde7911d5956ab5f13640a1a806092803eea0b6cb07bb

  • SSDEEP

    6144:BWylDcksxWe65bf67rHzZ8Ees9gbCKbGHOOJ3Vd6QBOT+VTJQQCklKAmAAcOGRwj:0yGksh8bfUrH2osCKi7kQBOTrE5F9wfL

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe
    "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe
      "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
      2⤵
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2148
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Roaming\PEVerify.exe
        "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3736 --field-trial-handle=2284,i,2771196087253062161,8107167670425198948,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp973F.tmp

      Filesize

      381B

      MD5

      1e4a89b11eae0fcf8bb5fdd5ec3b6f61

      SHA1

      4260284ce14278c397aaf6f389c1609b0ab0ce51

      SHA256

      4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df

      SHA512

      8c290919e456a80d87dd6d243e4713945432b9a2bc158bfa5b81ae9fed1a8dd693da51914fa4014c5b8596e36186a9c891741c3b9011958c7ac240b7d818f815

    • C:\Users\Admin\AppData\Roaming\Imminent\PID.dat

      Filesize

      4B

      MD5

      e21e4e58ad9ab56e8a4634046da90113

      SHA1

      d7c1f0dd609c0024d00c7eb35743bcc476459876

      SHA256

      2c6499976963e9832529bc8d9dff516d16c13d372d852d1500f5892e46a25507

      SHA512

      0a18737eff8dee2e701d7f75b10a56e5610ac75d379e0d4d5528adade8d7367618fafdfeb9f16b66c36daf4a152d96dcfe9e0b5b47a4cebb6fdad6a19fdb9134

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      59B

      MD5

      903bc0b85fb3242bd00462af69a6b34e

      SHA1

      20d8d42695d74cae9a05d04978ef79e015fc887c

      SHA256

      e9d122b170c38b2fe8dc1855b347d00cce07c7718d23516ffa9e1a637c6fcb89

      SHA512

      1ed4e6622cf36b361b10446377db746d45d26ce2c89d7ab13451107040d9cb7982cad2a810d23d737d49364c5b762ccfa54c74e6481c5cab70c509c618d119fb

    • C:\Users\Admin\AppData\Roaming\PEVerify.exe

      Filesize

      53KB

      MD5

      6c93f0cc87ec29681dc4c92eed621884

      SHA1

      95c432cabca506dc9ce77d2eb36a820a9c706b2e

      SHA256

      f7a659e450b6f82939e4e48436abff93788bdd41b0a4b34d25d72f24a3e24d1b

      SHA512

      dde8fa67890bdc07deb86b6e10b9cf773ac6bb3f0315de19cc67df2a6443d88d40e2a932a13e357c7d311863a495a88c20b2a034ba0a7862fe76893bf9c6427d

    • memory/2148-53-0x0000000000F40000-0x0000000000F50000-memory.dmp

      Filesize

      64KB

    • memory/2148-14-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB

    • memory/2148-18-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/2148-19-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/2148-20-0x0000000000F40000-0x0000000000F50000-memory.dmp

      Filesize

      64KB

    • memory/2148-50-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/3964-30-0x00000000091A0000-0x00000000091A1000-memory.dmp

      Filesize

      4KB

    • memory/3964-1-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/3964-0-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/3964-77-0x00000000091A0000-0x00000000091A1000-memory.dmp

      Filesize

      4KB

    • memory/3964-33-0x0000000009190000-0x0000000009199000-memory.dmp

      Filesize

      36KB

    • memory/3964-34-0x0000000009190000-0x0000000009199000-memory.dmp

      Filesize

      36KB

    • memory/3964-36-0x0000000009190000-0x0000000009199000-memory.dmp

      Filesize

      36KB

    • memory/3964-35-0x0000000009190000-0x0000000009199000-memory.dmp

      Filesize

      36KB

    • memory/3964-37-0x00000000091A0000-0x00000000091A1000-memory.dmp

      Filesize

      4KB

    • memory/3964-28-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/3964-40-0x0000000001180000-0x0000000001190000-memory.dmp

      Filesize

      64KB

    • memory/3964-2-0x0000000001180000-0x0000000001190000-memory.dmp

      Filesize

      64KB

    • memory/4724-25-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/4724-26-0x00000000018C0000-0x00000000018D0000-memory.dmp

      Filesize

      64KB

    • memory/4724-58-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB

    • memory/4724-59-0x00000000018C0000-0x00000000018D0000-memory.dmp

      Filesize

      64KB

    • memory/4724-27-0x0000000074860000-0x0000000074E11000-memory.dmp

      Filesize

      5.7MB