Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
Guidelines.xlam
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Guidelines.xlam
Resource
win10-en-20211208
General
-
Target
Guidelines.xlam
-
Size
127KB
-
MD5
e0f6bcdb71df502f7aefe22db8207a69
-
SHA1
9f7357219cbfb5b940d5809f8564a6bb821fa036
-
SHA256
0335de8eadbbd5dc7cbe92ef869bcea6f6596ac39a38680142c982ec6e97ecde
-
SHA512
ea9fc5fe2bcd8a225c7f7f7b8ea832e3d143278a07c6264edaf9476fb5e7852efdd9b3dbcde6e211ccb1e6d011b11845def65af58e9298a01b3067a05200d7cc
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab70-285.dat family_crimsonrat behavioral2/files/0x000500000001ab70-286.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 2 IoCs
pid Process 4076 hbraeiwas.exe 716 dlrarhsiva.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2524 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4076 2524 EXCEL.EXE 74 PID 2524 wrote to memory of 4076 2524 EXCEL.EXE 74 PID 4076 wrote to memory of 716 4076 hbraeiwas.exe 75 PID 4076 wrote to memory of 716 4076 hbraeiwas.exe 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Guidelines.xlam"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\Glhvadia\hbraeiwas.exeC:\Users\Admin\Glhvadia\hbraeiwas.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"3⤵
- Executes dropped EXE
PID:716
-
-