Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 04:53
Behavioral task
behavioral1
Sample
2628ad9be62db33bcc2dd982d80a7ec4ff840349a658795e13ef9611b784eefe.xls
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
2628ad9be62db33bcc2dd982d80a7ec4ff840349a658795e13ef9611b784eefe.xls
Resource
win10v2004-20220721-en
General
-
Target
2628ad9be62db33bcc2dd982d80a7ec4ff840349a658795e13ef9611b784eefe.xls
-
Size
423KB
-
MD5
fa6a95df0af45ff6601696678af711b6
-
SHA1
c87653f543d7c9386b92732e02ee64deac0e0100
-
SHA256
2628ad9be62db33bcc2dd982d80a7ec4ff840349a658795e13ef9611b784eefe
-
SHA512
362d3bd45dcf7b419661a4a77545d337d7f294a143f732e18dd7f728f04e99772bb45e205513c4c03f6975778ba2d812cc6e288ff5e6591ca04ad2a639d3fc02
Malware Config
Signatures
-
CrimsonRAT main payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0006000000022f58-139.dat family_crimsonrat behavioral2/files/0x0006000000022f58-140.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
rlbwrarhsa.exepid Process 4564 rlbwrarhsa.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4616 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
EXCEL.EXEpid Process 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 4616 wrote to memory of 4564 4616 EXCEL.EXE 89 PID 4616 wrote to memory of 4564 4616 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2628ad9be62db33bcc2dd982d80a7ec4ff840349a658795e13ef9611b784eefe.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\ProgramData\Tdlawis\rlbwrarhsa.exeC:\ProgramData\Tdlawis\rlbwrarhsa.exe2⤵
- Executes dropped EXE
PID:4564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.6MB
MD58a1f4a512fe9edbcc62ba4b1c3e08f0a
SHA1fcc99860e1029e0d989121be46eb1da2f8402853
SHA256ecd7d7a27a2a043919a233bb91e3b009c05b7c81ff132a7c29228e1c45d2b6a6
SHA5120e78fa869f051b5672b6f7a4dcc02ae7cdca55ba8ac2b14a34f30e94844fddb7caa22ac9fd555ac0bb270c1bfbedcb3e7ef074fcf9cba8dbf2ba0d5dc690444c
-
Filesize
9.6MB
MD58a1f4a512fe9edbcc62ba4b1c3e08f0a
SHA1fcc99860e1029e0d989121be46eb1da2f8402853
SHA256ecd7d7a27a2a043919a233bb91e3b009c05b7c81ff132a7c29228e1c45d2b6a6
SHA5120e78fa869f051b5672b6f7a4dcc02ae7cdca55ba8ac2b14a34f30e94844fddb7caa22ac9fd555ac0bb270c1bfbedcb3e7ef074fcf9cba8dbf2ba0d5dc690444c