Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 02:41

General

  • Target

    Installation/Dashboard.exe

  • Size

    797KB

  • MD5

    c6bceda41c1b91a41580266791040953

  • SHA1

    71e6a1ae130d59544c6d5aa55d93f2c3f2a43ec9

  • SHA256

    c00aee7d19d7b5c2ca9d010fb1880393355f94a68431a5b53e974522d503f43e

  • SHA512

    13e59fb257bf0fa79d30c76cb62a3578314e6f4eb145bee63cda76a30682c9129c3330102d1cd50d39eb401966ba950cdf34c2dfee2e04d9356822b10ce162fb

  • SSDEEP

    12288:eWeEpn1XaCGOntOyRxso93CVOp667avGD52:eK0CPhQG3CT6IGD5

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Installation\Dashboard.exe
    "C:\Users\Admin\AppData\Local\Temp\Installation\Dashboard.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ybdSmleEklbl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFC71.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4404
    • C:\Users\Admin\AppData\Local\Temp\Installation\Dashboard.exe
      "C:\Users\Admin\AppData\Local\Temp\Installation\Dashboard.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4796

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Dashboard.exe.log
    Filesize

    408B

    MD5

    9357aeac30c60e6624d070a03e2e36a3

    SHA1

    d9f1d068b3f6b0dbd4cec72753c761a5efd8ba25

    SHA256

    154998d6f0471484664b21526bc884c78593aad632d0ee0f4b29ace1946026cf

    SHA512

    859c74948e8b6c6a3a23f09248177bff7ea6f6c5f6a331f075751a5f569845eb3d58c10e05935bfafd2fd73e5f3d0734aa6a9dce8380cc7d7023d6ca6f7d4c4d

  • C:\Users\Admin\AppData\Local\Temp\tmpFC71.tmp
    Filesize

    1KB

    MD5

    22a5b5fae75d2c644c3a679150d61874

    SHA1

    3760070851dcb2bb0e03d593e8725499645c57af

    SHA256

    c0dd7edecf20f0407e382706e827acda4a0d5771b6954a7be0333fd0c5d76da7

    SHA512

    87c55375aac1702cf1a1605c4c54a57a703fd04c8acd0dca353fe1a0e1330f11c6a515d96f12f4608a0f8525e0b6edde415c4bd3018a1fef165a3ff492ad675d

  • memory/3228-0-0x0000000074D92000-0x0000000074D93000-memory.dmp
    Filesize

    4KB

  • memory/3228-1-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/3228-2-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/3228-3-0x0000000074D92000-0x0000000074D93000-memory.dmp
    Filesize

    4KB

  • memory/3228-4-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/3228-13-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/4796-15-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/4796-29-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-17-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-16-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-14-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/4796-37-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-35-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-34-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-32-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-18-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-28-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-26-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-24-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-23-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-22-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-21-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-19-0x0000000000590000-0x00000000005F0000-memory.dmp
    Filesize

    384KB

  • memory/4796-20-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB

  • memory/4796-43-0x0000000074D90000-0x0000000075341000-memory.dmp
    Filesize

    5.7MB