Analysis
-
max time kernel
153s -
max time network
170s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 15:58
Static task
static1
Behavioral task
behavioral1
Sample
230705996b567af8b2ed884e6c06cf2cf49a2cf5b4166a01c30d81de857627af.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
230705996b567af8b2ed884e6c06cf2cf49a2cf5b4166a01c30d81de857627af.doc
Resource
win10-en-20211208
General
-
Target
230705996b567af8b2ed884e6c06cf2cf49a2cf5b4166a01c30d81de857627af.doc
-
Size
699KB
-
MD5
9039772c966690525d843413a752be7e
-
SHA1
d637f799d3f6a584074eaa12a3ed6da366f5450b
-
SHA256
230705996b567af8b2ed884e6c06cf2cf49a2cf5b4166a01c30d81de857627af
-
SHA512
c1efdcbee986075446b9469f828f6c0be71902490e81a3d9e64101aeabfc56220536894eb0a4145c619302a9c674b2a9f5877f5a892da7a8164b207f3050b501
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab31-318.dat family_crimsonrat behavioral2/files/0x000500000001ab31-319.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 1776 hringarma.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 3704 WINWORD.EXE 3704 WINWORD.EXE 1808 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3704 WINWORD.EXE 3704 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 1808 WINWORD.EXE 3704 WINWORD.EXE 1808 WINWORD.EXE 3704 WINWORD.EXE 3704 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1776 3704 WINWORD.EXE 71 PID 3704 wrote to memory of 1776 3704 WINWORD.EXE 71 PID 3704 wrote to memory of 1776 3704 WINWORD.EXE 71
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\230705996b567af8b2ed884e6c06cf2cf49a2cf5b4166a01c30d81de857627af.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\ProgramData\Remdias\hringarma.exeC:\ProgramData\Remdias\hringarma.exe2⤵
- Executes dropped EXE
PID:1776
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1808