Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe
Resource
win10-en-20211208
General
-
Target
dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe
-
Size
84KB
-
MD5
b6e148ee1a2a3b460dd2a0adbf1dd39c
-
SHA1
ec0efbe8fd2fa5300164e9e4eded0d40da549c60
-
SHA256
dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba
-
SHA512
4b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000013905-57.dat family_crimsonrat behavioral1/files/0x0006000000013905-56.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 572 dlrarhsiva.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Hdlharas\dlrarhsiva.exe dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe File opened for modification C:\PROGRA~3\Hdlharas\dlrarhsiva.exe dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 572 1592 dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe 27 PID 1592 wrote to memory of 572 1592 dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe 27 PID 1592 wrote to memory of 572 1592 dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe"C:\Users\Admin\AppData\Local\Temp\dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:572
-