Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 16:39

General

  • Target

    071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc

  • Size

    529KB

  • MD5

    4c0e752600746b6d67cf1d49c103d64a

  • SHA1

    438850c4611c409e816f6981569b6a1ed68d2720

  • SHA256

    071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0

  • SHA512

    fd0b993c7595751c7eff2a288b3503f4d16fb7466c65bc224abbc902b722082878c24ccfc8a8b8c24f52f8248996af13642092a0c5e5ebf2def60d78d5ebb811

Score
10/10

Malware Config

Signatures

  • CrimsonRAT Main Payload 3 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\ProgramData\Fdlrob\ndnextgen.exe
      C:\ProgramData\Fdlrob\ndnextgen.exe
      2⤵
      • Executes dropped EXE
      PID:1812
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:964

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/752-54-0x0000000072761000-0x0000000072764000-memory.dmp

      Filesize

      12KB

    • memory/752-55-0x00000000701E1000-0x00000000701E3000-memory.dmp

      Filesize

      8KB

    • memory/752-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/752-57-0x0000000075431000-0x0000000075433000-memory.dmp

      Filesize

      8KB

    • memory/752-58-0x0000000005860000-0x00000000064AA000-memory.dmp

      Filesize

      12.3MB

    • memory/964-64-0x000007FEFBE11000-0x000007FEFBE13000-memory.dmp

      Filesize

      8KB

    • memory/1812-62-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB