Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
nisha arora sharma.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
nisha arora sharma.exe
Resource
win10-en-20211208
General
-
Target
nisha arora sharma.exe
-
Size
1.1MB
-
MD5
29fca616297a9c37e800cdc7b654bc6a
-
SHA1
40e353837ce0924b3b86badabfafe7597929aff9
-
SHA256
f29895d3fd197101aa284f5076a40e4e951614a7faaf214254488879b2e235f3
-
SHA512
2532bbce592e94a8eac3668da048dc87ccf632cdc65d2edfeda380f767e71f21854fa53354463b1d980fdedeab1ec5ac11f244da035c8f66e9a14397adf0fcb1
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000600000001ab31-121.dat family_crimsonrat behavioral2/files/0x000600000001ab31-122.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3000 udhgariwe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings nisha arora sharma.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3252 WINWORD.EXE 3252 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 udhgariwe.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE 3252 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3000 3064 nisha arora sharma.exe 69 PID 3064 wrote to memory of 3000 3064 nisha arora sharma.exe 69 PID 3064 wrote to memory of 3252 3064 nisha arora sharma.exe 72 PID 3064 wrote to memory of 3252 3064 nisha arora sharma.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\nisha arora sharma.exe"C:\Users\Admin\AppData\Local\Temp\nisha arora sharma.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\ProgramData\Dathlas\udhgariwe.exe"C:\ProgramData\Dathlas\udhgariwe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\nisha arora sharma_6 .docx" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3252
-