Analysis
-
max time kernel
4294216s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
25-03-2022 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe
Resource
win10v2004-en-20220113
General
-
Target
6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe
-
Size
270KB
-
MD5
db12a808823a93d95a2eb9719e0e5122
-
SHA1
5e2dcbddfd28c41bc6da89c3bbf1a9ac20b1080b
-
SHA256
6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0
-
SHA512
9817834daf4021b2510950ec1db6f9f905d122e1453ea170e9b9ef3c79c3871afcecfa6fd0a7937815c84a187250beca6102ef4d81a77ddff931a527407c4262
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral1/files/0x000900000001235e-58.dat family_crimsonrat behavioral1/files/0x000900000001235e-59.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 1624 valthasrvin.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Gthrentl\valthasrvin.exe 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe File opened for modification C:\PROGRA~3\Gthrentl\valthasrvin.exe 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1180 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1624 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 27 PID 1152 wrote to memory of 1624 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 27 PID 1152 wrote to memory of 1624 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 27 PID 1152 wrote to memory of 1180 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 28 PID 1152 wrote to memory of 1180 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 28 PID 1152 wrote to memory of 1180 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 28 PID 1152 wrote to memory of 1180 1152 6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe"C:\Users\Admin\AppData\Local\Temp\6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\ProgramData\Gthrentl\valthasrvin.exe"C:\ProgramData\Gthrentl\valthasrvin.exe"2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\6257ab26547f390bfd67d60766a708a95998452eb487d6d7208a52dc3e9840e0-02 .doc"2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1180
-