Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    21/01/2022, 23:13

General

  • Target

    cnic.exe

  • Size

    1.1MB

  • MD5

    d13d2599e21ec94b45320ec1ab7511de

  • SHA1

    db0e8a599b37a4b462e380a2be3f0cbd3b8f2ca4

  • SHA256

    706ca8e074ad04777a408b845ed56c1d675902cc2ef0aa6cca29430e967ba7af

  • SHA512

    4982f4b3571878f011e4013558e523ee0a661b55b411b110f835c36bbe286421f7dfb998583efed60e03ae43c646a45574c2aaeb8cce7ef450f204bd4de284c9

Score
10/10

Malware Config

Signatures

  • CrimsonRAT Main Payload 2 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cnic.exe
    "C:\Users\Admin\AppData\Local\Temp\cnic.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\ProgramData\AdobMR\ravighruam.exe
      "C:\ProgramData\AdobMR\ravighruam.exe"
      2⤵
      • Executes dropped EXE
      PID:1676
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Documents\cnic.exe_6 .pdf"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/608-62-0x0000000076C61000-0x0000000076C63000-memory.dmp

    Filesize

    8KB

  • memory/1676-59-0x000007FEF2CA0000-0x000007FEF3D36000-memory.dmp

    Filesize

    16.6MB

  • memory/1676-61-0x0000000000260000-0x0000000000400000-memory.dmp

    Filesize

    1.6MB

  • memory/1676-60-0x0000000000260000-0x0000000000400000-memory.dmp

    Filesize

    1.6MB

  • memory/1776-54-0x0000000001FD0000-0x0000000001FD2000-memory.dmp

    Filesize

    8KB

  • memory/1776-55-0x000007FEF2CA0000-0x000007FEF3D36000-memory.dmp

    Filesize

    16.6MB

  • memory/1776-56-0x0000000001FD6000-0x0000000001FF5000-memory.dmp

    Filesize

    124KB