Analysis Overview
SHA256
dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e
Threat Level: Known bad
The file dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e was found to be: Known bad.
Malicious Activity Summary
CrimsonRAT Main Payload
CrimsonRat
Executes dropped EXE
Drops file in Program Files directory
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-01-21 23:02
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-01-21 23:02
Reported
2022-01-21 23:30
Platform
win7-en-20211208
Max time kernel
151s
Max time network
129s
Command Line
Signatures
CrimsonRAT Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
CrimsonRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\Ladhnara\nirtbivaes.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\PROGRA~3\Ladhnara\nirtbivaes.exe | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | N/A |
| File opened for modification | C:\PROGRA~3\Ladhnara\nirtbivaes.exe | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1412 wrote to memory of 1376 | N/A | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | C:\ProgramData\Ladhnara\nirtbivaes.exe |
| PID 1412 wrote to memory of 1376 | N/A | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | C:\ProgramData\Ladhnara\nirtbivaes.exe |
| PID 1412 wrote to memory of 1376 | N/A | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | C:\ProgramData\Ladhnara\nirtbivaes.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe
"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"
C:\ProgramData\Ladhnara\nirtbivaes.exe
"C:\ProgramData\Ladhnara\nirtbivaes.exe"
Network
| Country | Destination | Domain | Proto |
| US | 64.188.12.126:6658 | tcp | |
| US | 64.188.12.126:4676 | tcp |
Files
memory/1412-54-0x0000000001000000-0x000000000106A000-memory.dmp
memory/1412-55-0x000000001B300000-0x000000001B302000-memory.dmp
C:\ProgramData\Ladhnara\nirtbivaes.exe
| MD5 | 8d42aaeaa6fc19c74b744ccf20e51150 |
| SHA1 | e350b04dc8a3005649c8d54716b740c37d12dd53 |
| SHA256 | 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e |
| SHA512 | 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19 |
C:\ProgramData\Ladhnara\nirtbivaes.exe
| MD5 | 8d42aaeaa6fc19c74b744ccf20e51150 |
| SHA1 | e350b04dc8a3005649c8d54716b740c37d12dd53 |
| SHA256 | 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e |
| SHA512 | 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19 |
memory/1376-58-0x0000000000B80000-0x0000000000B82000-memory.dmp
memory/1376-59-0x000007FEEB910000-0x000007FEEC9A6000-memory.dmp
memory/1376-60-0x0000000000B86000-0x0000000000BA5000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-01-21 23:02
Reported
2022-01-21 23:30
Platform
win10-en-20211208
Max time kernel
140s
Max time network
156s
Command Line
Signatures
CrimsonRAT Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
CrimsonRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\Ladhnara\nirtbivaes.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2452 wrote to memory of 652 | N/A | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | C:\ProgramData\Ladhnara\nirtbivaes.exe |
| PID 2452 wrote to memory of 652 | N/A | C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe | C:\ProgramData\Ladhnara\nirtbivaes.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe
"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"
C:\ProgramData\Ladhnara\nirtbivaes.exe
"C:\ProgramData\Ladhnara\nirtbivaes.exe"
Network
| Country | Destination | Domain | Proto |
| US | 35.208.104.210:443 | tcp | |
| US | 52.109.8.21:443 | tcp | |
| US | 64.188.12.126:6658 | tcp | |
| US | 64.188.12.126:4676 | tcp |
Files
memory/2452-115-0x000001CDE7660000-0x000001CDE76CA000-memory.dmp
memory/2452-116-0x000001CDE9BA0000-0x000001CDE9BA2000-memory.dmp
C:\ProgramData\Ladhnara\nirtbivaes.exe
| MD5 | c1a8625fd15f04171bd32a9d95ffba5b |
| SHA1 | d960f728e3312447063d209e6534bc28f615df9f |
| SHA256 | 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697 |
| SHA512 | d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0 |
C:\ProgramData\Ladhnara\nirtbivaes.exe
| MD5 | c1a8625fd15f04171bd32a9d95ffba5b |
| SHA1 | d960f728e3312447063d209e6534bc28f615df9f |
| SHA256 | 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697 |
| SHA512 | d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0 |
memory/652-119-0x000001461CDD0000-0x000001461D792000-memory.dmp
memory/652-120-0x0000014637F10000-0x0000014637F12000-memory.dmp