Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:39
Static task
static1
Behavioral task
behavioral1
Sample
071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc
Resource
win10-en-20211208
General
-
Target
071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc
-
Size
529KB
-
MD5
4c0e752600746b6d67cf1d49c103d64a
-
SHA1
438850c4611c409e816f6981569b6a1ed68d2720
-
SHA256
071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0
-
SHA512
fd0b993c7595751c7eff2a288b3503f4d16fb7466c65bc224abbc902b722082878c24ccfc8a8b8c24f52f8248996af13642092a0c5e5ebf2def60d78d5ebb811
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab33-441.dat family_crimsonrat behavioral2/files/0x000500000001ab33-442.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 1296 ndnextgen.exe -
Deletes itself 1 IoCs
pid Process 3448 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3448 WINWORD.EXE 3448 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3448 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE 3448 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 1296 3448 WINWORD.EXE 71 PID 3448 wrote to memory of 1296 3448 WINWORD.EXE 71 PID 3448 wrote to memory of 1296 3448 WINWORD.EXE 71
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc" /o ""1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\ProgramData\Fdlrob\ndnextgen.exeC:\ProgramData\Fdlrob\ndnextgen.exe2⤵
- Executes dropped EXE
PID:1296
-