Analysis Overview
SHA256
a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0
Threat Level: Known bad
The file a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0 was found to be: Known bad.
Malicious Activity Summary
CrimsonRAT Main Payload
Crimsonrat family
Adds Run key to start application
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-01-29 14:40
Signatures
CrimsonRAT Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Crimsonrat family
Analysis: behavioral1
Detonation Overview
Submitted
2022-01-29 14:40
Reported
2022-01-29 14:44
Platform
win7-en-20211208
Max time kernel
118s
Max time network
117s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ms_mainApp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\windowsWord.exe" | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe
"C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 193.164.131.58:10000 | tcp | |
| DE | 193.164.131.58:10000 | tcp | |
| DE | 193.164.131.58:10000 | tcp |
Files
memory/764-54-0x0000000075D61000-0x0000000075D63000-memory.dmp
memory/764-55-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-01-29 14:40
Reported
2022-01-29 14:45
Platform
win10-en-20211208
Max time kernel
158s
Max time network
191s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\ms_mainApp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\windowsWord.exe" | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe
"C:\Users\Admin\AppData\Local\Temp\a68219383dd7e7dfd4142adac8573f89a5f6efe2feeb83c871d45c989376b8a0.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 193.164.131.58:10000 | tcp | |
| US | 8.8.8.8:53 | oneocsp.microsoft.com | udp |
| US | 204.79.197.203:80 | oneocsp.microsoft.com | tcp |
| DE | 193.164.131.58:10000 | tcp | |
| DE | 193.164.131.58:10000 | tcp |
Files
memory/1992-118-0x0000000000600000-0x000000000074A000-memory.dmp