Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 22:30

General

  • Target

    59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32.exe

  • Size

    881KB

  • MD5

    3bb2899abfced1162e02f284920de161

  • SHA1

    f11a8f882de65265993134d0207f28041d83769e

  • SHA256

    59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

  • SHA512

    3a966266057ecc453bd7a92c5fcefaff5ad2368404f5fbcc0b8070e1856254199f3ddc6d995a2d45f5c5c7075b51228428686f074e6a1f94b1e133a6bbec941a

  • SSDEEP

    12288:0NlZD4U9LBMYROgRk6ofYAF3nyN0+U4H444l+:SiUYgu6ofnn60+U4H444l+

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Detects executables packed with SmartAssembly 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32.exe
    "C:\Users\Admin\AppData\Local\Temp\59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk " /f
        3⤵
          PID:2944
      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
        "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe

      Filesize

      881KB

      MD5

      3bb2899abfced1162e02f284920de161

      SHA1

      f11a8f882de65265993134d0207f28041d83769e

      SHA256

      59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

      SHA512

      3a966266057ecc453bd7a92c5fcefaff5ad2368404f5fbcc0b8070e1856254199f3ddc6d995a2d45f5c5c7075b51228428686f074e6a1f94b1e133a6bbec941a

    • \Users\Admin\AppData\Local\Temp\svhost.exe

      Filesize

      52KB

      MD5

      278edbd499374bf73621f8c1f969d894

      SHA1

      a81170af14747781c5f5f51bb1215893136f0bc0

      SHA256

      c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391

      SHA512

      93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

    • memory/1964-0-0x0000000074731000-0x0000000074732000-memory.dmp

      Filesize

      4KB

    • memory/1964-1-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/1964-2-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/1964-31-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2612-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2612-20-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-12-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-16-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-13-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-25-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-23-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-27-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2612-28-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2612-14-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2612-34-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB