Resubmissions

13/02/2025, 01:26 UTC

250213-btppra1pcz 10

17/01/2025, 20:14 UTC

250117-yz7h3s1qfw 10

17/01/2025, 20:12 UTC

250117-yy9l2sslcr 10

17/01/2025, 17:25 UTC

250117-vy9p9sxpez 10

17/01/2025, 17:21 UTC

250117-vw8eesyjfp 10

17/01/2025, 14:16 UTC

250117-rk9ass1rhk 10

17/01/2025, 14:12 UTC

250117-rhv1ds1lds 10

16/01/2025, 12:52 UTC

250116-p4et7a1mez 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2025, 17:25 UTC

General

  • Target

    Malware-1-master/Software.exe

  • Size

    1.6MB

  • MD5

    db056b8fa628b67e11bd626192939d6b

  • SHA1

    248ca50f39de6b6180265d19fb6eedc68bf25afc

  • SHA256

    e7f04e85236f0caafe518bd96369313021969077dba1c4a6d42e694498dab04f

  • SHA512

    bca1856b4bb8342c0f6d5ee19edcb420c70e6b272f087d3f8f73daa00842fa00037840a5eb5655e1445af8d578d304874323b2889f75b27136df9366df596336

  • SSDEEP

    24576:ytb20pkaCqT5TBWgNQ7ayEYyM63uUOyok0ceJZwd/w9mML9eu4MaMUp46A:/Vg5tQ7ayExZO9k0waPLR4Ma25

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\Software.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\Software.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3464
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1056

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      7.98.22.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      7.98.22.2.in-addr.arpa
      IN PTR
      Response
      7.98.22.2.in-addr.arpa
      IN PTR
      a2-22-98-7deploystaticakamaitechnologiescom
    • flag-us
      DNS
      196.249.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      196.249.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      241.150.49.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.150.49.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      56.163.245.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.163.245.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      8.153.16.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.153.16.2.in-addr.arpa
      IN PTR
      Response
      8.153.16.2.in-addr.arpa
      IN PTR
      a2-16-153-8deploystaticakamaitechnologiescom
    • flag-us
      DNS
      91.65.42.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      91.65.42.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      245.131.30.184.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      245.131.30.184.in-addr.arpa
      IN PTR
      Response
      245.131.30.184.in-addr.arpa
      IN PTR
      a184-30-131-245deploystaticakamaitechnologiescom
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      156 B
      3
    • 185.158.139.144:5645
      InstallUtil.exe
      104 B
      2
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      7.98.22.2.in-addr.arpa
      dns
      68 B
      129 B
      1
      1

      DNS Request

      7.98.22.2.in-addr.arpa

    • 8.8.8.8:53
      196.249.167.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      196.249.167.52.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      241.150.49.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      241.150.49.20.in-addr.arpa

    • 8.8.8.8:53
      56.163.245.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      56.163.245.4.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      8.153.16.2.in-addr.arpa
      dns
      69 B
      131 B
      1
      1

      DNS Request

      8.153.16.2.in-addr.arpa

    • 8.8.8.8:53
      91.65.42.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      91.65.42.20.in-addr.arpa

    • 8.8.8.8:53
      245.131.30.184.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      245.131.30.184.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\autA3A2.tmp

      Filesize

      322KB

      MD5

      67d0ccbe9439616cfa416f33906874e7

      SHA1

      7a64de6020b77767a19ce5ba6a425076f1e84183

      SHA256

      00ca0571f9aea13daba403b1a514e87a250ed555e097002260bdc88a844212e3

      SHA512

      7b4fce8374b56f418957d396104ac59f0262820bc90defb86485c3a166ad4e5002405bb62d01c2934c1deab634f86414a26fd1fa634b3223389367a88514e8d3

    • memory/3464-10-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/3464-11-0x0000000073FBE000-0x0000000073FBF000-memory.dmp

      Filesize

      4KB

    • memory/3464-12-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/3464-13-0x0000000073FB0000-0x0000000074760000-memory.dmp

      Filesize

      7.7MB

    • memory/3464-14-0x00000000050F0000-0x000000000519E000-memory.dmp

      Filesize

      696KB

    • memory/3464-15-0x0000000004FA0000-0x0000000004FC8000-memory.dmp

      Filesize

      160KB

    • memory/3464-16-0x00000000054B0000-0x000000000554C000-memory.dmp

      Filesize

      624KB

    • memory/3464-17-0x0000000005B00000-0x00000000060A4000-memory.dmp

      Filesize

      5.6MB

    • memory/3464-18-0x0000000005730000-0x00000000057C2000-memory.dmp

      Filesize

      584KB

    • memory/3464-19-0x0000000006120000-0x0000000006186000-memory.dmp

      Filesize

      408KB

    • memory/3464-20-0x0000000006100000-0x0000000006118000-memory.dmp

      Filesize

      96KB

    • memory/3464-21-0x0000000006640000-0x0000000006656000-memory.dmp

      Filesize

      88KB

    • memory/3464-22-0x0000000006830000-0x000000000683A000-memory.dmp

      Filesize

      40KB

    • memory/3464-28-0x0000000073FBE000-0x0000000073FBF000-memory.dmp

      Filesize

      4KB

    • memory/3464-29-0x0000000073FB0000-0x0000000074760000-memory.dmp

      Filesize

      7.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.