Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 16:39

General

  • Target

    071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc

  • Size

    529KB

  • MD5

    4c0e752600746b6d67cf1d49c103d64a

  • SHA1

    438850c4611c409e816f6981569b6a1ed68d2720

  • SHA256

    071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0

  • SHA512

    fd0b993c7595751c7eff2a288b3503f4d16fb7466c65bc224abbc902b722082878c24ccfc8a8b8c24f52f8248996af13642092a0c5e5ebf2def60d78d5ebb811

Score
10/10

Malware Config

Signatures

  • CrimsonRAT Main Payload 2 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\071c2ac354452d484a37e7af15dd4685061dd4af93abad4308f41df673132ff0.doc" /o ""
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\ProgramData\Fdlrob\ndnextgen.exe
      C:\ProgramData\Fdlrob\ndnextgen.exe
      2⤵
      • Executes dropped EXE
      PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1296-443-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/3448-115-0x00007FFE0CBA0000-0x00007FFE0CBB0000-memory.dmp

    Filesize

    64KB

  • memory/3448-116-0x00007FFE0CBA0000-0x00007FFE0CBB0000-memory.dmp

    Filesize

    64KB