Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01/04/2021, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.bin.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.bin.doc
Resource
win10v20201028
General
-
Target
dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.bin.doc
-
Size
790KB
-
MD5
c7a3276763a5c1b13f93028aab5a6e73
-
SHA1
c2844b69a36b3be37f8db97b0afc051f6bf36671
-
SHA256
dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676
-
SHA512
2ef8d3eb3f1368591666d9f85dddb210c05fe16569f3553086f42d7b82133669c5a9e7fe1263407bb54bb9f75216ef9fcb78348427e334ef74afd6e3f429c01a
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab45-10.dat family_crimsonrat behavioral2/files/0x000100000001ab45-9.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3272 ravidhtirad.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4712 WINWORD.EXE 4712 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3272 ravidhtirad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3272 ravidhtirad.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4712 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE 4712 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4712 wrote to memory of 3272 4712 WINWORD.EXE 75 PID 4712 wrote to memory of 3272 4712 WINWORD.EXE 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.bin.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\ProgramData\Dlymrdsa\ravidhtirad.exeC:\ProgramData\Dlymrdsa\ravidhtirad.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-