Analysis

  • max time kernel
    301s
  • max time network
    289s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 09:04

General

  • Target

    477147271a54e32ef184030393f17c30d68d4aeb8bd6202a225e354f1800b279.exe

  • Size

    220KB

  • MD5

    3829791a486b0b9ccb80ffcb7177c19c

  • SHA1

    63b775ca11d595d65b8dfa4215823e7cb98c55af

  • SHA256

    477147271a54e32ef184030393f17c30d68d4aeb8bd6202a225e354f1800b279

  • SHA512

    f1d6950caf18ae7b3f68c6cecded468a706a08ec6a33d6ea29d21f6d120badcb020ae89a3c0be2fadd64424cc931724dbda3b0bd0c4b23f161ab86bde57b4d66

Score
10/10

Malware Config

Signatures

  • CrimsonRAT Main Payload 2 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\477147271a54e32ef184030393f17c30d68d4aeb8bd6202a225e354f1800b279.exe
    "C:\Users\Admin\AppData\Local\Temp\477147271a54e32ef184030393f17c30d68d4aeb8bd6202a225e354f1800b279.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\ProgramData\Paints\athvindaur.exe
      "C:\ProgramData\Paints\athvindaur.exe"
      2⤵
      • Executes dropped EXE
      PID:2924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Paints\athvindaur.exe

    Filesize

    10.5MB

    MD5

    9ffd75516536c9e9f0e6a4cbefe24dcb

    SHA1

    5037f1297c44da969bbe30f3139a79933ae9a371

    SHA256

    6514d2900609c10b2abd5fec18f8938f88a050cde56f51633b93bd0fa6d1b1df

    SHA512

    ac678c0d96e02aac671a5290a5d28d3be7679999974d467f998e06ca1008779b8c78302bcb858b7c6e0f81fd4a07922d1bde32088f1c3c906696aa66486ec709

  • C:\ProgramData\Paints\athvindaur.exe

    Filesize

    10.5MB

    MD5

    9ffd75516536c9e9f0e6a4cbefe24dcb

    SHA1

    5037f1297c44da969bbe30f3139a79933ae9a371

    SHA256

    6514d2900609c10b2abd5fec18f8938f88a050cde56f51633b93bd0fa6d1b1df

    SHA512

    ac678c0d96e02aac671a5290a5d28d3be7679999974d467f998e06ca1008779b8c78302bcb858b7c6e0f81fd4a07922d1bde32088f1c3c906696aa66486ec709

  • memory/2924-132-0x0000000000000000-mapping.dmp

  • memory/2924-135-0x0000015B8D900000-0x0000015B8E38E000-memory.dmp

    Filesize

    10.6MB

  • memory/2924-136-0x00007FFEC9570000-0x00007FFECA031000-memory.dmp

    Filesize

    10.8MB

  • memory/2924-137-0x0000015BA9D70000-0x0000015BA9D72000-memory.dmp

    Filesize

    8KB

  • memory/4808-130-0x0000000000DB0000-0x0000000000DB2000-memory.dmp

    Filesize

    8KB

  • memory/4808-131-0x0000000000DB2000-0x0000000000DB4000-memory.dmp

    Filesize

    8KB