Analysis
-
max time kernel
161s -
max time network
177s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc
Resource
win10-en-20211208
General
-
Target
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc
-
Size
566KB
-
MD5
cbfae579a25df1e2fe0e02934efd65dc
-
SHA1
54c987ddc4e08defe2cee3882a2b729d55aef3ce
-
SHA256
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41
-
SHA512
d9df94d65771ac9a136f30bd4d8fc359bda057ea92a4da476f38df2976460a55b3afdb445ff873f71b34ed43f6b0954f0e16e202ff48f59e47bc36b1e736eb9f
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Dhoithas\brwmarivas.exe family_crimsonrat C:\ProgramData\Dhoithas\brwmarivas.exe family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 2 IoCs
Processes:
rihndimrva.exebrwmarivas.exepid process 3236 rihndimrva.exe 1268 brwmarivas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2748 WINWORD.EXE 2748 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXErihndimrva.exedescription pid process target process PID 2748 wrote to memory of 3236 2748 WINWORD.EXE rihndimrva.exe PID 2748 wrote to memory of 3236 2748 WINWORD.EXE rihndimrva.exe PID 3236 wrote to memory of 1268 3236 rihndimrva.exe brwmarivas.exe PID 3236 wrote to memory of 1268 3236 rihndimrva.exe brwmarivas.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\ProgramData\Hblondas\rihndimrva.exeC:\ProgramData\Hblondas\rihndimrva.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\ProgramData\Dhoithas\brwmarivas.exe"C:\ProgramData\Dhoithas\brwmarivas.exe"3⤵
- Executes dropped EXE
PID:1268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d62156fa2c5bffdc63f0975c5482eab6
SHA127cb14bdb9680baa504f9ed8d7b8d5f0f1426533
SHA256e4fd6452566102631a74d55b5a74b3fc5a2b7431144fb0ecf9f9fe64489a7409
SHA512784cea7f3c2bc5e78b47960833bfcdc679b8f5d4c46959209bb30e84a7c9f999cfb80a41af19cece8b3e83a529938c1fcf6484005368a130fbeadbb3258c1784
-
MD5
d62156fa2c5bffdc63f0975c5482eab6
SHA127cb14bdb9680baa504f9ed8d7b8d5f0f1426533
SHA256e4fd6452566102631a74d55b5a74b3fc5a2b7431144fb0ecf9f9fe64489a7409
SHA512784cea7f3c2bc5e78b47960833bfcdc679b8f5d4c46959209bb30e84a7c9f999cfb80a41af19cece8b3e83a529938c1fcf6484005368a130fbeadbb3258c1784
-
MD5
6967ee112e93b812947e663a968b48c3
SHA159f2388abcb19e10109a6d2571bc9d496af23a67
SHA2569ec58c011d7efbc2272a0403cd90cb4640858da7b080819737af6f1dd6b6f1e0
SHA512b92c28437eedb15c54f86e4515b61de603f04b0573b229736a9d16a1183622c78150d43779dffc1a721d33c4ba39bfc1445f16e99dff99c78910abf31943ac61
-
MD5
6967ee112e93b812947e663a968b48c3
SHA159f2388abcb19e10109a6d2571bc9d496af23a67
SHA2569ec58c011d7efbc2272a0403cd90cb4640858da7b080819737af6f1dd6b6f1e0
SHA512b92c28437eedb15c54f86e4515b61de603f04b0573b229736a9d16a1183622c78150d43779dffc1a721d33c4ba39bfc1445f16e99dff99c78910abf31943ac61