Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30/01/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
sonam karwati.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
sonam karwati.exe
Resource
win10-en-20211208
General
-
Target
sonam karwati.exe
-
Size
459KB
-
MD5
1f4afc5843bb6156627d0aa7feb18e1f
-
SHA1
773121980b0c7b188156836b9ed341d673f8f4f6
-
SHA256
92717c8ecbf6524a9fefb57a346872292daa2132aeb492ccf725208474ad9179
-
SHA512
d0173b8f0bcc076c0d9fb1ae7d0e634f89a2bda56168be66e02c91fe3c084bb142ee70dcdb18fad81ed81fa550da05fe52dda36c5578287ecb9e3d4a50c409ad
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab2b-117.dat family_crimsonrat behavioral2/files/0x000500000001ab2b-118.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3504 rwlbmarivs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings sonam karwati.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2232 WINWORD.EXE 2232 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE 2232 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 3504 2740 sonam karwati.exe 69 PID 2740 wrote to memory of 3504 2740 sonam karwati.exe 69 PID 2740 wrote to memory of 2232 2740 sonam karwati.exe 70 PID 2740 wrote to memory of 2232 2740 sonam karwati.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\sonam karwati.exe"C:\Users\Admin\AppData\Local\Temp\sonam karwati.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\ProgramData\Bhithoas\rwlbmarivs.exe"C:\ProgramData\Bhithoas\rwlbmarivs.exe"2⤵
- Executes dropped EXE
PID:3504
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\sonam karwati_02 .docx" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2232
-