Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21/01/2022, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
MoI Operation/MoI Operation.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MoI Operation/MoI Operation.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
MoI Operation/MoI Operation.exe
-
Size
309KB
-
MD5
2a2088cc646b984cb3d75d18c8708eb5
-
SHA1
20ceef8731d905794c8d7a14f4ecf9fb5aa29e28
-
SHA256
5a449782c6d286a5af7fd5cbab5d5d46dd4dd153cbc46e4aeae0ea54f2785980
-
SHA512
cc23d711d756ca322786d0327b017af5e457b2ac144a03cdff9456164bd58e5dfa0b5ac6df02c9a3d7036cd82a29278eed055357e7080797673aaed95886de1d
Score
10/10
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001412c-58.dat family_crimsonrat behavioral1/files/0x000500000001412c-59.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 292 nirtbivaes.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~3\Ladhnara\nirtbivaes.exe MoI Operation.exe File created C:\PROGRA~3\Ladhnara\nirtbivaes.exe MoI Operation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 292 1368 MoI Operation.exe 27 PID 1368 wrote to memory of 292 1368 MoI Operation.exe 27 PID 1368 wrote to memory of 292 1368 MoI Operation.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\ProgramData\Ladhnara\nirtbivaes.exe"C:\ProgramData\Ladhnara\nirtbivaes.exe"2⤵
- Executes dropped EXE
PID:292
-