Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe
Resource
win10-en-20211208
General
-
Target
108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe
-
Size
1013KB
-
MD5
bd0c697c1bb3128d887f5af37b363061
-
SHA1
7be657c8e978a035ef6b3f16a97c6e4a16fa75cc
-
SHA256
108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3
-
SHA512
92323c92b7b3c4196f3b8973d156ea49fa77a6fade1ff92c996155b0ab8c05cf2be3ab7c356dc5c18382fcbf6600a3407b088987e27a8a7ada94a8edd431b4fc
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab62-122.dat family_crimsonrat behavioral2/files/0x000500000001ab62-123.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3796 radhrviga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe 3880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 348 wrote to memory of 3796 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 69 PID 348 wrote to memory of 3796 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 69 PID 348 wrote to memory of 3796 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 69 PID 348 wrote to memory of 3880 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 70 PID 348 wrote to memory of 3880 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 70 PID 348 wrote to memory of 3880 348 108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe 70 PID 3880 wrote to memory of 1992 3880 AcroRd32.exe 71 PID 3880 wrote to memory of 1992 3880 AcroRd32.exe 71 PID 3880 wrote to memory of 1992 3880 AcroRd32.exe 71 PID 3880 wrote to memory of 1052 3880 AcroRd32.exe 74 PID 3880 wrote to memory of 1052 3880 AcroRd32.exe 74 PID 3880 wrote to memory of 1052 3880 AcroRd32.exe 74 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 520 1992 RdrCEF.exe 75 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76 PID 1992 wrote to memory of 1292 1992 RdrCEF.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe"C:\Users\Admin\AppData\Local\Temp\108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:348 -
C:\ProgramData\AdobIR\radhrviga.exe"C:\ProgramData\AdobIR\radhrviga.exe"2⤵
- Executes dropped EXE
PID:3796
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Documents\108ea9a83499004c3b618a2d547bdcdd470a7012ed0eba1dcf5bdca93beb4bb3.exe_3 .pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D4AC1583C775A4F12A89756E8B04716D --mojo-platform-channel-handle=1624 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:520
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7E8822DE49E46B80320707E63CCB399D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7E8822DE49E46B80320707E63CCB399D --renderer-client-id=2 --mojo-platform-channel-handle=1652 --allow-no-sandbox-job /prefetch:14⤵PID:1292
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9821D864C7455F75542FCA2F6785F882 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9821D864C7455F75542FCA2F6785F882 --renderer-client-id=4 --mojo-platform-channel-handle=2060 --allow-no-sandbox-job /prefetch:14⤵PID:2240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=31ADE7D1CB362B487CB4281E2281BB3C --mojo-platform-channel-handle=2460 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=517D969B3B093A7E4FD432AAB628111C --mojo-platform-channel-handle=1656 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1680
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=99D3D5ED71C64813574D4C3EFECAA518 --mojo-platform-channel-handle=1812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2144
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:1052
-
-