Analysis
-
max time kernel
158s -
max time network
166s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21/01/2022, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
cd0c624ff748d78e41c851356fbc9cc6945b426f65f64df08c7648eecc88c481.docm
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cd0c624ff748d78e41c851356fbc9cc6945b426f65f64df08c7648eecc88c481.docm
Resource
win10-en-20211208
General
-
Target
cd0c624ff748d78e41c851356fbc9cc6945b426f65f64df08c7648eecc88c481.docm
-
Size
107KB
-
MD5
b0e7976f2e3dc8b7636462715740c00e
-
SHA1
de109f4be750fe0d7ed38300274d1e3b95e9c82a
-
SHA256
cd0c624ff748d78e41c851356fbc9cc6945b426f65f64df08c7648eecc88c481
-
SHA512
d76db5979eb9c2493a03298d4536b1be426a8d53710a520b0a33c7ec76bce3ed8118719d71885350331a5d371ad84a2e9947e39affb608eb2087ca1f69e9ea68
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab5a-329.dat family_crimsonrat behavioral2/files/0x000500000001ab5a-330.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 2 IoCs
pid Process 3840 vndhragies.exe 1428 nwdhirgaur.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2668 WINWORD.EXE 2668 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE 2668 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3840 2668 WINWORD.EXE 71 PID 2668 wrote to memory of 3840 2668 WINWORD.EXE 71 PID 3840 wrote to memory of 1428 3840 vndhragies.exe 72 PID 3840 wrote to memory of 1428 3840 vndhragies.exe 72
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cd0c624ff748d78e41c851356fbc9cc6945b426f65f64df08c7648eecc88c481.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\ProgramData\Hhlmdvs\vndhragies.exeC:\ProgramData\Hhlmdvs\vndhragies.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\ProgramData\Hblface\nwdhirgaur.exe"C:\ProgramData\Hblface\nwdhirgaur.exe"3⤵
- Executes dropped EXE
PID:1428
-
-