Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-11-2020 00:30
Static task
static1
Behavioral task
behavioral1
Sample
297a331c90ab8923b7d44a8c2e59f7b8.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
297a331c90ab8923b7d44a8c2e59f7b8.exe
Resource
win10v20201028
General
-
Target
297a331c90ab8923b7d44a8c2e59f7b8.exe
-
Size
296KB
-
MD5
297a331c90ab8923b7d44a8c2e59f7b8
-
SHA1
881514ba7df186ec16ac03d279cb0c1df8afb948
-
SHA256
4546bf50e116c0cc49d206b2be2815f2724944ba7aa0b305837f90dbddd863c7
-
SHA512
41a6543f21c25f385adb8c604d991454d23c9e540a7ca24e86653de4b9232d581de67e2680c966ef8179f951b110c0246f602b6260e940432bf164d44936e52d
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab7b-9.dat family_crimsonrat behavioral2/files/0x000100000001ab7b-8.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
fhrnthivesa.exepid Process 3760 fhrnthivesa.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
297a331c90ab8923b7d44a8c2e59f7b8.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings 297a331c90ab8923b7d44a8c2e59f7b8.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 1684 WINWORD.EXE 1684 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
WINWORD.EXEpid Process 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE 1684 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
297a331c90ab8923b7d44a8c2e59f7b8.exedescription pid Process procid_target PID 816 wrote to memory of 1684 816 297a331c90ab8923b7d44a8c2e59f7b8.exe 75 PID 816 wrote to memory of 1684 816 297a331c90ab8923b7d44a8c2e59f7b8.exe 75 PID 816 wrote to memory of 3760 816 297a331c90ab8923b7d44a8c2e59f7b8.exe 76 PID 816 wrote to memory of 3760 816 297a331c90ab8923b7d44a8c2e59f7b8.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\297a331c90ab8923b7d44a8c2e59f7b8.exe"C:\Users\Admin\AppData\Local\Temp\297a331c90ab8923b7d44a8c2e59f7b8.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\297a331c90ab8923b7d44a8c2e59f7b8-03-.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\ProgramData\Hinthavra\fhrnthivesa.exe"C:\ProgramData\Hinthavra\fhrnthivesa.exe"2⤵
- Executes dropped EXE
PID:3760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1db10d9e7e4e5f99b9e9a0dcc28b7bfe
SHA12881e9c1e7ead60c58baf5bf1586b5ab876604c2
SHA2562732810cf41b3f9b37026327b3e70aa62fd6606d976fe7043b8e89e9de023ef5
SHA512a5144f38c50fd9dd2fbaf83eb470385a01d21828d63a6ab370672c77afefaf624437fd628125c3d811b9c2f75ed42b08c22048dab4ab8429ae005ef2ac0d4fa1
-
MD5
1db10d9e7e4e5f99b9e9a0dcc28b7bfe
SHA12881e9c1e7ead60c58baf5bf1586b5ab876604c2
SHA2562732810cf41b3f9b37026327b3e70aa62fd6606d976fe7043b8e89e9de023ef5
SHA512a5144f38c50fd9dd2fbaf83eb470385a01d21828d63a6ab370672c77afefaf624437fd628125c3d811b9c2f75ed42b08c22048dab4ab8429ae005ef2ac0d4fa1
-
MD5
f64f49093d7ab643e82ed84653baff2f
SHA177342908c3d547aae2a1710e2ba94c44457459cb
SHA256d136b6156b82ed61c6489d8fdd983747ec5817ba6784f7c6c13381ace789ad00
SHA5126430764d7e530741dfb0f4cae38ad8ff8bf45abd324ac7fefdbf642a251fb30c6a27860171d9f8e2d411ce14cfc3ec6bdaea052010fc6ae06643884a26c58274