Malware Analysis Report

2024-10-19 10:21

Sample ID 220121-2wsgjaccej
Target e881c562ad195b51c9800bc32e8f170db651a7a97a9b3cc1304e80661e156c9f
SHA256 e881c562ad195b51c9800bc32e8f170db651a7a97a9b3cc1304e80661e156c9f
Tags
crimsonrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e881c562ad195b51c9800bc32e8f170db651a7a97a9b3cc1304e80661e156c9f

Threat Level: Known bad

The file e881c562ad195b51c9800bc32e8f170db651a7a97a9b3cc1304e80661e156c9f was found to be: Known bad.

Malicious Activity Summary

crimsonrat rat

CrimsonRAT Main Payload

CrimsonRat

Executes dropped EXE

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-21 22:56

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 22:56

Reported

2022-01-21 23:24

Platform

win10-en-20211208

Max time kernel

152s

Max time network

196s

Command Line

"C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2736 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe C:\ProgramData\Ladhnara\nirtbivaes.exe
PID 2736 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe C:\ProgramData\Ladhnara\nirtbivaes.exe

Processes

C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe

"C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp

Files

memory/2736-115-0x000002A17D5E0000-0x000002A17D630000-memory.dmp

memory/2736-116-0x000002A17FDD0000-0x000002A17FDD2000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

memory/4088-119-0x0000022317300000-0x0000022317CC2000-memory.dmp

memory/4088-120-0x0000022332380000-0x0000022332382000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 22:56

Reported

2022-01-21 23:23

Platform

win7-en-20211208

Max time kernel

144s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe N/A
File created C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe

"C:\Users\Admin\AppData\Local\Temp\scan0001\scan0001.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp
US 64.188.12.126:4676 tcp

Files

memory/1684-54-0x00000000010A0000-0x00000000010F0000-memory.dmp

memory/1684-55-0x000000001B0D0000-0x000000001B0D2000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

memory/276-59-0x0000000002800000-0x0000000002902000-memory.dmp

memory/276-58-0x000007FEEB0D0000-0x000007FEEC166000-memory.dmp

memory/276-60-0x0000000002906000-0x0000000002925000-memory.dmp