Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
30-01-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe
Resource
win10-en-20211208
General
-
Target
7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe
-
Size
1.0MB
-
MD5
b7c83538606a08f71107a5202acdb57a
-
SHA1
4bb1c28653a1754fd71d57d6deb51d281c21b43d
-
SHA256
7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a
-
SHA512
428fe43f1a9e9b7f81d68ebc1c1df9bd1eae7b25144d39def9f524a0250b39012b6c1d2044d4530d8413039d514da8148847018d216012d5cf560632587e4afd
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral1/files/0x00060000000138f2-57.dat family_crimsonrat behavioral1/files/0x00060000000138f2-58.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 1532 rvlrarhsma.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Rellhars\rvlrarhsma.exe 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe File opened for modification C:\PROGRA~3\Rellhars\rvlrarhsma.exe 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 852 AcroRd32.exe 852 AcroRd32.exe 852 AcroRd32.exe 852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 964 wrote to memory of 1532 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 29 PID 964 wrote to memory of 1532 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 29 PID 964 wrote to memory of 1532 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 29 PID 964 wrote to memory of 852 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 30 PID 964 wrote to memory of 852 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 30 PID 964 wrote to memory of 852 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 30 PID 964 wrote to memory of 852 964 7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe"C:\Users\Admin\AppData\Local\Temp\7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:964 -
C:\ProgramData\Rellhars\rvlrarhsma.exe"C:\ProgramData\Rellhars\rvlrarhsma.exe"2⤵
- Executes dropped EXE
PID:1532
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Documents\7de78f7c806f828ef071a103b7be87636414635e008ea2463bf33077a466140a-4 .pdf"2⤵
- Suspicious use of SetWindowsHookEx
PID:852
-