Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 09:10

General

  • Target

    24d6bdcc1fd603ed16d96146e9dd9c3c876c19f70a0b262de431e5c333b43d49.exe

  • Size

    908KB

  • MD5

    58af7b91af918aaaf0517c50728ea7ed

  • SHA1

    a36361938df502286245392342b9f5d0c214ac94

  • SHA256

    24d6bdcc1fd603ed16d96146e9dd9c3c876c19f70a0b262de431e5c333b43d49

  • SHA512

    abfceb84ae216b4f92a7290d4d3ad0e7bb845026ea760d3d948479a792b1fbe8a526298ed5df8f4a4b7401aa8afc773f2920ea04be43e04b239f8586259840c6

  • SSDEEP

    12288:QqjqRBa80gi+TCUQpd6KA26mY6nltHnhm9FXRN:QwqN0gi+TCUQvHEFXb

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24d6bdcc1fd603ed16d96146e9dd9c3c876c19f70a0b262de431e5c333b43d49.exe
    "C:\Users\Admin\AppData\Local\Temp\24d6bdcc1fd603ed16d96146e9dd9c3c876c19f70a0b262de431e5c333b43d49.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Roaming\model\print.exe
      "C:\Users\Admin\AppData\Roaming\model\print.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5076
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1904,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:8
    1⤵
      PID:4324
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2476

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\model\print.exe

        Filesize

        908KB

        MD5

        d62ed9e8b79158c576a077e083489a0d

        SHA1

        87ad1bfb8b88d94f31f35a60f075e106b668133b

        SHA256

        f6e373bb1d2be7027d4a30197d70a6539150447be35567185651bbd9487618f4

        SHA512

        dc453af544385fc933d8f3497681f46ca5f55f55e5e9af245c7a303430e5b4a76e79ede79f03d7ccd8b7fe73f5840b082e781a1843ee00ac674d7f2c462aef5f

      • memory/2980-0-0x000000007460E000-0x000000007460F000-memory.dmp

        Filesize

        4KB

      • memory/2980-1-0x0000000000600000-0x00000000006DE000-memory.dmp

        Filesize

        888KB

      • memory/2980-2-0x00000000055F0000-0x0000000005B94000-memory.dmp

        Filesize

        5.6MB

      • memory/2980-3-0x0000000005120000-0x00000000051B2000-memory.dmp

        Filesize

        584KB

      • memory/2980-4-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/2980-5-0x00000000050E0000-0x00000000050EA000-memory.dmp

        Filesize

        40KB

      • memory/2980-6-0x00000000050D0000-0x00000000050D8000-memory.dmp

        Filesize

        32KB

      • memory/2980-7-0x000000007460E000-0x000000007460F000-memory.dmp

        Filesize

        4KB

      • memory/2980-8-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/2980-23-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/3920-26-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/3920-30-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/3920-25-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/3920-22-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/3920-27-0x00000000067C0000-0x0000000006818000-memory.dmp

        Filesize

        352KB

      • memory/3920-24-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/5076-33-0x0000000001100000-0x0000000001110000-memory.dmp

        Filesize

        64KB

      • memory/5076-31-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/5076-32-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/5076-28-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/5076-34-0x00000000054C0000-0x000000000556E000-memory.dmp

        Filesize

        696KB

      • memory/5076-35-0x0000000005470000-0x0000000005498000-memory.dmp

        Filesize

        160KB

      • memory/5076-36-0x0000000005850000-0x00000000058EC000-memory.dmp

        Filesize

        624KB

      • memory/5076-37-0x00000000064C0000-0x0000000006526000-memory.dmp

        Filesize

        408KB

      • memory/5076-38-0x0000000006490000-0x00000000064A8000-memory.dmp

        Filesize

        96KB

      • memory/5076-39-0x00000000069D0000-0x00000000069E6000-memory.dmp

        Filesize

        88KB

      • memory/5076-45-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB

      • memory/5076-46-0x0000000074600000-0x0000000074DB0000-memory.dmp

        Filesize

        7.7MB