Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21/01/2022, 23:44

General

  • Target

    67da24711012366322f2e6ab3534d62c064d24dc6e113b6077354c792cc56b71.xlam

  • Size

    112KB

  • MD5

    1b54bc52032731b5c75b9f74df7e1afe

  • SHA1

    cdddaf72deb956e039e5e8c10230d6c872a34e10

  • SHA256

    67da24711012366322f2e6ab3534d62c064d24dc6e113b6077354c792cc56b71

  • SHA512

    818961365b8dd76b7cdc90e2b00d9419e13de6e0797b9fb012a2b4bcaf4e5856376ebeb216ceb9afe810b34a4227e3222aea85ccc872f7ae013a5b98f46c54d3

Score
10/10

Malware Config

Signatures

  • CrimsonRAT Main Payload 2 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\67da24711012366322f2e6ab3534d62c064d24dc6e113b6077354c792cc56b71.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\Uthmdsa\pnvthirena.exe
      C:\Users\Admin\Uthmdsa\pnvthirena.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\ProgramData\Addobephot\hdlbvarims.exe
        "C:\ProgramData\Addobephot\hdlbvarims.exe"
        3⤵
        • Executes dropped EXE
        PID:3172

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3048-118-0x00007FFDCF190000-0x00007FFDCF1A0000-memory.dmp

          Filesize

          64KB

        • memory/3048-128-0x00007FFDCC4B0000-0x00007FFDCC4C0000-memory.dmp

          Filesize

          64KB

        • memory/3048-129-0x00007FFDCC4B0000-0x00007FFDCC4C0000-memory.dmp

          Filesize

          64KB

        • memory/3048-266-0x000001DE5C100000-0x000001DE5C104000-memory.dmp

          Filesize

          16KB

        • memory/3048-121-0x00007FFDCF190000-0x00007FFDCF1A0000-memory.dmp

          Filesize

          64KB

        • memory/3048-116-0x00007FFDCF190000-0x00007FFDCF1A0000-memory.dmp

          Filesize

          64KB

        • memory/3048-117-0x00007FFDCF190000-0x00007FFDCF1A0000-memory.dmp

          Filesize

          64KB

        • memory/3048-115-0x00007FFDCF190000-0x00007FFDCF1A0000-memory.dmp

          Filesize

          64KB

        • memory/3172-284-0x0000000003670000-0x0000000003672000-memory.dmp

          Filesize

          8KB

        • memory/3172-285-0x0000000003672000-0x0000000003674000-memory.dmp

          Filesize

          8KB

        • memory/3988-278-0x0000000003180000-0x0000000003182000-memory.dmp

          Filesize

          8KB