Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:13
Static task
static1
Behavioral task
behavioral1
Sample
khushi pics all/khushi.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
khushi pics all/khushi.exe
Resource
win10-en-20211208
General
-
Target
khushi pics all/khushi.exe
-
Size
985KB
-
MD5
3cb7f596cbaa622e8b505335722ab558
-
SHA1
617df380f49c4017315f503c5947c88d80b4ab21
-
SHA256
1fdb5dd192e813f337adc21dfe4a31e1de10bd2bbb5b58ca51a6836b7e108953
-
SHA512
b3879f19e65ec0de247c6f835405e94362697fed09669edca22ba491e1c1cd7a5e82487c26324e43db00f9c4593f32efdd81549061cb46ae9d6df61b9d6ec9a6
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000600000001265d-58.dat family_crimsonrat behavioral1/files/0x000600000001265d-57.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
widthacan.exepid Process 676 widthacan.exe -
Drops file in Program Files directory 2 IoCs
Processes:
khushi.exedescription ioc Process File created C:\PROGRA~3\Btharmis\widthacan.exe khushi.exe File opened for modification C:\PROGRA~3\Btharmis\widthacan.exe khushi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
khushi.exedescription pid Process procid_target PID 1660 wrote to memory of 676 1660 khushi.exe 27 PID 1660 wrote to memory of 676 1660 khushi.exe 27 PID 1660 wrote to memory of 676 1660 khushi.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\khushi pics all\khushi.exe"C:\Users\Admin\AppData\Local\Temp\khushi pics all\khushi.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\Btharmis\widthacan.exe"C:\ProgramData\Btharmis\widthacan.exe"2⤵
- Executes dropped EXE
PID:676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bebdda9a0c250cb9cc356864d38aa20c
SHA106ab93d7d22b209b163bfeed0c13535d69d391cc
SHA2569e98fd3ad7527503b255a70ee461c02a3c9ef9aabdee3173d2f8fbb8c93d2d50
SHA5123e83570473f8162f30b6c30a1ebade86f1600bce91b90a26880824560c5960ca6e66a21e19f26d89770b5673aa532b174749d1c9e018900f41733b694cf2abd9
-
MD5
bebdda9a0c250cb9cc356864d38aa20c
SHA106ab93d7d22b209b163bfeed0c13535d69d391cc
SHA2569e98fd3ad7527503b255a70ee461c02a3c9ef9aabdee3173d2f8fbb8c93d2d50
SHA5123e83570473f8162f30b6c30a1ebade86f1600bce91b90a26880824560c5960ca6e66a21e19f26d89770b5673aa532b174749d1c9e018900f41733b694cf2abd9