Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 00:58

General

  • Target

    keygen.exe

  • Size

    474KB

  • MD5

    c1cfbe3462978d8fee8b0ad881d88766

  • SHA1

    b501ac3965b05b2e7362274ab0b7be2a543b02c9

  • SHA256

    ec5116beddb3fbf853920fa28fdd5b190818b3c6ee7385c1871a4c9512e9eab9

  • SHA512

    00b55b0d3bac872e123134fb83ff294b6cdc638d4a8e8ab24d04d42085f4c1aebe79108a9be6e46c6f17d42310bf266a7b0dc41fa8e3308ecc27764374064780

  • SSDEEP

    12288:9pUEpygn7dfjcP+1PhW/+0/+OGCgiRQVaaeFn:3AqpfjSiyx/+J8aeF

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Deletes itself 9 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 32 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 10 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 24 IoCs
  • NTFS ADS 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:2032
    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
      "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\keygen\keygen.exe
        "C:\Users\Admin\AppData\Local\Temp\keygen\keygen.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen\keygen.exe":ZONE.identifier & exit
          4⤵
          • Subvert Trust Controls: Mark-of-the-Web Bypass
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          PID:2964
        • C:\Users\Admin\AppData\Local\Temp\keygen\keygen.exe
          "C:\Users\Admin\AppData\Local\Temp\keygen\keygen.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\SysWOW64\taskmgr.exe
            "C:\Windows\System32\taskmgr.exe"
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2124
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2484
    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
      "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
        3⤵
        • Subvert Trust Controls: Mark-of-the-Web Bypass
        • System Location Discovery: System Language Discovery
        • NTFS ADS
        PID:1992
      • C:\Users\Admin\AppData\Local\Temp\keygen.exe
        "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2524
      • C:\Users\Admin\AppData\Local\Temp\keygen.exe
        "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
          4⤵
          • Subvert Trust Controls: Mark-of-the-Web Bypass
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          PID:1144
        • C:\Users\Admin\AppData\Local\Temp\keygen.exe
          "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2172
        • C:\Users\Admin\AppData\Local\Temp\keygen.exe
          "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2672
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
            5⤵
            • Subvert Trust Controls: Mark-of-the-Web Bypass
            • System Location Discovery: System Language Discovery
            • NTFS ADS
            PID:2820
          • C:\Users\Admin\AppData\Local\Temp\keygen.exe
            "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
            5⤵
            • Deletes itself
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2808
          • C:\Users\Admin\AppData\Local\Temp\keygen.exe
            "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2144
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
              6⤵
              • Subvert Trust Controls: Mark-of-the-Web Bypass
              • System Location Discovery: System Language Discovery
              • NTFS ADS
              PID:884
            • C:\Users\Admin\AppData\Local\Temp\keygen.exe
              "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
              6⤵
              • Deletes itself
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1368
            • C:\Users\Admin\AppData\Local\Temp\keygen.exe
              "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2312
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
                7⤵
                • Subvert Trust Controls: Mark-of-the-Web Bypass
                • System Location Discovery: System Language Discovery
                • NTFS ADS
                PID:2704
              • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                7⤵
                • Deletes itself
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2724
              • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2960
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
                  8⤵
                  • Subvert Trust Controls: Mark-of-the-Web Bypass
                  • System Location Discovery: System Language Discovery
                  • NTFS ADS
                  PID:3056
                • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                  "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                  8⤵
                  • Deletes itself
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1352
                • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                  "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1340
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
                    9⤵
                    • Subvert Trust Controls: Mark-of-the-Web Bypass
                    • System Location Discovery: System Language Discovery
                    • NTFS ADS
                    PID:2472
                  • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                    "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                    9⤵
                    • Deletes itself
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1792
                  • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                    "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1564
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\keygen.exe":ZONE.identifier & exit
                      10⤵
                      • Subvert Trust Controls: Mark-of-the-Web Bypass
                      • System Location Discovery: System Language Discovery
                      • NTFS ADS
                      PID:2744
                    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                      "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                      10⤵
                      • Deletes itself
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2720
                    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
                      "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    474KB

    MD5

    c1cfbe3462978d8fee8b0ad881d88766

    SHA1

    b501ac3965b05b2e7362274ab0b7be2a543b02c9

    SHA256

    ec5116beddb3fbf853920fa28fdd5b190818b3c6ee7385c1871a4c9512e9eab9

    SHA512

    00b55b0d3bac872e123134fb83ff294b6cdc638d4a8e8ab24d04d42085f4c1aebe79108a9be6e46c6f17d42310bf266a7b0dc41fa8e3308ecc27764374064780

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe:ZONE.identifier

    Filesize

    28B

    MD5

    90fd34c6bd120fb6d41d18161a05296b

    SHA1

    346e55ea4c486d9f4ac7e65793c34fc18e5a28b1

    SHA256

    53c9dbb7d60a9fd6c12d2580557472f0132cc26c055e2e841b455be1b8713695

    SHA512

    74a0d8a648267a6c2a31cecd076a3d30d59951ca3e00b8e2e0a935a709cd105c6a8da2da6988f4c3bbef13aea3ad9a805547e8373e57a471d1f794db4ca4709e

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    54B

    MD5

    a0d295bd586a1735e87fbc214a8aea15

    SHA1

    271ae6bfdd06fe0487a61fdf344ea40d4349e6ea

    SHA256

    88891c61dd0e0b8dcac004777310ec01a888adad2f8648b686dc1a9073c2637f

    SHA512

    5651a26a4cc6bd6fae2bae5eca18273d08c7d64f7a303a3cc02f5c15a2a20185ed04e31f85789b41d72d75cdcd92fa38bf290b28d69d96816af9ba79e49e50c3

  • C:\Users\Admin\AppData\Roaming\rundll32.exe

    Filesize

    474KB

    MD5

    3003c45ff56aaf453741e3c2738a4996

    SHA1

    bbdcee92add087ecd5f4bdbd610884ad5a7962a0

    SHA256

    7e9e8d1b71e384f8ad853c904a307d66793c669abc6884fbbc7044c681147f4c

    SHA512

    e57fed22b359033956a2ae1479c346046450ec15e9e464b7921dfbf6cbc57b45c9bb40cbea01569bed7d5baad172d69846bd805eff6fb571259f1d5af1817f46

  • memory/1492-92-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-86-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-88-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-89-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-78-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-94-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-97-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-87-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-90-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-75-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1492-82-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/1492-85-0x0000000000070000-0x00000000000CE000-memory.dmp

    Filesize

    376KB

  • memory/2064-20-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-22-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-47-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-46-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-43-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-40-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-37-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-36-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-34-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-32-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-31-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-30-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-29-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-28-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-27-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-26-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-58-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-9-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-45-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-10-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-11-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-13-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-17-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-23-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-24-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-42-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2064-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-0-0x0000000074701000-0x0000000074702000-memory.dmp

    Filesize

    4KB

  • memory/2756-61-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-5-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-4-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-2-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-1-0x0000000074700000-0x0000000074CAB000-memory.dmp

    Filesize

    5.7MB