Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:25
Static task
static1
Behavioral task
behavioral1
Sample
11c45925b64777eaa401a6c0f6a6f847fb80e82d8da8fdfe1156d28663fd9396.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
11c45925b64777eaa401a6c0f6a6f847fb80e82d8da8fdfe1156d28663fd9396.doc
Resource
win10-en-20211208
General
-
Target
11c45925b64777eaa401a6c0f6a6f847fb80e82d8da8fdfe1156d28663fd9396.doc
-
Size
3.0MB
-
MD5
d851a1c634cd8a63d9dcf0db5b84b200
-
SHA1
3208d7bc352771507837e075586e83216cc61be5
-
SHA256
11c45925b64777eaa401a6c0f6a6f847fb80e82d8da8fdfe1156d28663fd9396
-
SHA512
12444b6ade5beb5f658ade2553013eac17a8e766bf210e3914b0393ab2252752c89ca3c33705008916895d8ad070f8c8279d63e3eedb2323354c6c1d0a8a9a06
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000600000001ab65-293.dat family_crimsonrat behavioral2/files/0x000600000001ab65-294.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3436 hringarma.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 3572 WINWORD.EXE 3572 WINWORD.EXE 528 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3572 WINWORD.EXE 3572 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 528 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3436 3572 WINWORD.EXE 73 PID 3572 wrote to memory of 3436 3572 WINWORD.EXE 73 PID 3572 wrote to memory of 3436 3572 WINWORD.EXE 73
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\11c45925b64777eaa401a6c0f6a6f847fb80e82d8da8fdfe1156d28663fd9396.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\ProgramData\Remdias\hringarma.exeC:\ProgramData\Remdias\hringarma.exe2⤵
- Executes dropped EXE
PID:3436
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:528