Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 04:45

General

  • Target

    93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe

  • Size

    577KB

  • MD5

    e9bd9c64632c5db5747b37b3454e6cfd

  • SHA1

    94dd85e7e20b1b4a4a7b20b60532aa9cb6f045fa

  • SHA256

    93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e

  • SHA512

    35de0589431caa05e33c41efde0fa2f3888e79475d19d087d1aa4295686fb7e753245fad3451103436d62bb0f62fb291a661bb7c4a8a91e5670aead73958be59

  • SSDEEP

    12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7t:rBJwdhMJ6ZzHrfcsMGTfZ5Pt

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
    "C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe
      "C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4808
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe

      Filesize

      577KB

      MD5

      2ffd7690369e009cf2c7a2e9d853ab4b

      SHA1

      5680f95170ffcfe7f751e5d7fb2283f2f28c780b

      SHA256

      3e9a19c22d1d05998ce7d2368f81552520b13135c57b0623b2cda633d8f92a68

      SHA512

      8a5083701ad5f29b1f694341f60c23d9176848e9ab0d3298222bb547c77b0a84e1e22aec335855f963a41d2d16ec3b0e0650b027545782838b61e2d308f67466

    • memory/904-22-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/904-1-0x0000000000DB0000-0x0000000000E44000-memory.dmp

      Filesize

      592KB

    • memory/904-2-0x0000000005E70000-0x0000000006414000-memory.dmp

      Filesize

      5.6MB

    • memory/904-3-0x00000000058C0000-0x0000000005952000-memory.dmp

      Filesize

      584KB

    • memory/904-4-0x0000000005840000-0x000000000584A000-memory.dmp

      Filesize

      40KB

    • memory/904-5-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/904-6-0x0000000005830000-0x000000000583A000-memory.dmp

      Filesize

      40KB

    • memory/904-7-0x00000000745EE000-0x00000000745EF000-memory.dmp

      Filesize

      4KB

    • memory/904-8-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/904-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

      Filesize

      4KB

    • memory/4808-33-0x0000000006760000-0x00000000067FC000-memory.dmp

      Filesize

      624KB

    • memory/4808-32-0x00000000086D0000-0x00000000086F8000-memory.dmp

      Filesize

      160KB

    • memory/4808-45-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/4808-44-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/4808-27-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4808-30-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/4808-28-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/4808-29-0x0000000002B70000-0x0000000002B80000-memory.dmp

      Filesize

      64KB

    • memory/4808-31-0x00000000052A0000-0x000000000534E000-memory.dmp

      Filesize

      696KB

    • memory/4808-38-0x0000000007A20000-0x0000000007A36000-memory.dmp

      Filesize

      88KB

    • memory/4808-35-0x00000000078D0000-0x00000000078E8000-memory.dmp

      Filesize

      96KB

    • memory/4808-34-0x00000000073D0000-0x0000000007436000-memory.dmp

      Filesize

      408KB

    • memory/5004-23-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-37-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-24-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-26-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-25-0x00000000745E0000-0x0000000074D90000-memory.dmp

      Filesize

      7.7MB