Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 17:28

General

  • Target

    cea2d53f3741c750f8da141ce3044b9c.exe

  • Size

    548KB

  • MD5

    cea2d53f3741c750f8da141ce3044b9c

  • SHA1

    e4c40c26e0556447cbb8c5731aa3b4fe9a1e9399

  • SHA256

    059da1d4aca3dac5c4e827e9e7a5ebd07e3b3581135c200cdcb7c5e9be5065e3

  • SHA512

    36067bd002f52ea95d6eb2d2a84808a879bc0af619938ade50b2bb08fe440af897815b5066c89fbe7383f99f08a77449fdfd0524636b22a500117d3c17fec615

  • SSDEEP

    12288:e9dVKCxkIgeqXqXBb9P3BpcLLWW7HMwBIMQxlskGljE3af6EJ:yXKCFgeCqXBN3MswjQxkJ

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cea2d53f3741c750f8da141ce3044b9c.exe
    "C:\Users\Admin\AppData\Local\Temp\cea2d53f3741c750f8da141ce3044b9c.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\Or's industry\PairBusy.exe
      "C:\Users\Admin\AppData\Local\Temp\Or's industry\PairBusy.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\Or's industry\PairBusy.exe
        "C:\Users\Admin\AppData\Local\Temp\Or's industry\PairBusy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2456
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b94fc84fa0e803262ba3750fac5ef38

    SHA1

    bf8f9451593ae54ccddb9e6259cba2a1540ee282

    SHA256

    deb8137a60d4488fa338a31235892f5f272aef1059611586802f4e044f0b312c

    SHA512

    4f74b741d0ae310b782772cbe5b4f0f72ba5a68e287e60ad6bd7b276dbb3578e01aca7ccade37010aa82bc25f55b23918df6502b920beede9ce60ffb8fe01450

  • C:\Users\Admin\AppData\Local\Temp\Cab3EC5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\inventory.jpg

    Filesize

    9KB

    MD5

    63e0efcc12f3b2ebddb6ab9d342d4a23

    SHA1

    7327ff8d23249998c3106ad6ed4d68f6190ec184

    SHA256

    bf08b6fa8d1001c8fc4788ea960e2d52721b2b21c7c00a6253580deb8d15d38e

    SHA512

    a461dd215b9ec807376cd2fe4388b3b43da4c849453f8a5cdfed9013dc38e55dabeb4f0eb7ab16a52d85adcda7fe9f2c00fa6cca67ec088483b8ec77be7f510c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Against Down.lnk

    Filesize

    1KB

    MD5

    c1beb7b1f321484c181242d7843414eb

    SHA1

    6a6e4b6d56ba557d0e194d8231cdcc49a98f791f

    SHA256

    1690bdd698c4fd8657e7c193b9a2384adddd1f3791fd57e35f9ba218feea2863

    SHA512

    111a1ef066c4b970e7957ccc6cde6fd0d1d15d2818dbb2019b4e10cbf542a5868e10688d2a66a6f8b460ec52928a8a7495b8a7ad3289f0a7630d9c971c0d7731

  • \Users\Admin\AppData\Local\Temp\Or's industry\PairBusy.exe

    Filesize

    548KB

    MD5

    cea2d53f3741c750f8da141ce3044b9c

    SHA1

    e4c40c26e0556447cbb8c5731aa3b4fe9a1e9399

    SHA256

    059da1d4aca3dac5c4e827e9e7a5ebd07e3b3581135c200cdcb7c5e9be5065e3

    SHA512

    36067bd002f52ea95d6eb2d2a84808a879bc0af619938ade50b2bb08fe440af897815b5066c89fbe7383f99f08a77449fdfd0524636b22a500117d3c17fec615

  • memory/2456-38-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2456-58-0x0000000000CC0000-0x0000000000D00000-memory.dmp

    Filesize

    256KB

  • memory/2456-57-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2456-48-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2456-47-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2456-45-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2456-44-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2520-23-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-35-0x0000000000C90000-0x0000000000CD0000-memory.dmp

    Filesize

    256KB

  • memory/2520-34-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-25-0x0000000000C90000-0x0000000000CD0000-memory.dmp

    Filesize

    256KB

  • memory/2520-49-0x0000000004820000-0x0000000004822000-memory.dmp

    Filesize

    8KB

  • memory/2520-56-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2724-50-0x0000000000790000-0x0000000000792000-memory.dmp

    Filesize

    8KB

  • memory/2724-52-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/2724-59-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/2972-0-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2972-24-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2972-2-0x0000000000AD0000-0x0000000000B10000-memory.dmp

    Filesize

    256KB

  • memory/2972-1-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB