Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2023 07:26

General

  • Target

    f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm

  • Size

    129KB

  • MD5

    d6cf93b031f2e3b8758c41f5ce665a1f

  • SHA1

    dd3040f2b246bf729de40573721442d8efd4e070

  • SHA256

    f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea

  • SHA512

    1e118d5bf9c18286c7005670d3212f042d32e18004d7e5b7840380490df2fe73e3e59dcabbd6cf90e1d95357e548a3f3aee05cff895af93415e0bc69e00d3680

  • SSDEEP

    3072:FyZLYyIKIfKTzY+J4WRyasXGcSOv+zb4coB168mOKIGuH+dyRwKyR7Ep:FMLNWK/Y24WK2cbv+ol03K+qwHY

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

172.245.80.12

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\Ms Word_32\jedvmtrvh.exe
      "C:\Users\Admin\Ms Word_32\jedvmtrvh.exe"
      2⤵
      • Executes dropped EXE
      PID:1928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1172

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\Documents\f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm.docx

      Filesize

      20KB

      MD5

      cd7c56daa6b18500aaff80cbe9569d67

      SHA1

      82152bfacfc4262eed634a46a727eb7b26dcf50b

      SHA256

      4f5b450af343d4405de13d65a3be4001df383dd7a82e66d36c7d18f9c93b2dbd

      SHA512

      c59d77260578d46baa56635caf810d82118942479c791604926ca455d71d496afe62c7e9bd53a37a929996237d54c61c0c359b1b37aa44851d6cc500ba3a1717

    • C:\Users\Admin\MSWORD~1\docks.zip

      Filesize

      129KB

      MD5

      d6cf93b031f2e3b8758c41f5ce665a1f

      SHA1

      dd3040f2b246bf729de40573721442d8efd4e070

      SHA256

      f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea

      SHA512

      1e118d5bf9c18286c7005670d3212f042d32e18004d7e5b7840380490df2fe73e3e59dcabbd6cf90e1d95357e548a3f3aee05cff895af93415e0bc69e00d3680

    • C:\Users\Admin\Ms Word_32\docks.zip:Zone.Identifier

      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • C:\Users\Admin\Ms Word_32\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_32\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_32\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_32\word\jedvmtrvh.zip

      Filesize

      255KB

      MD5

      c7026aa76880ff7e889deaf6e2b416b1

      SHA1

      23c5c5d462edc2e0bc3b920dd34c1c30c793cc54

      SHA256

      da757853f4940996087b6755dd65eba3c9c5bdce29deebf5ded92e752ab6896c

      SHA512

      ee477813db63842307a8e45c00a6cd2a378feb3fa26d425703e8a3b839be365db05dd64aba47ccc709232f9f50fd87685c30ba038d0d7145a75f6241cbadc74e

    • \Users\Admin\Ms Word_32\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • memory/1088-63-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-60-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-64-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-68-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-67-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-65-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-193-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

      Filesize

      4KB

    • memory/1088-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1088-62-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-66-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-61-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-59-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-57-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1088-442-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

      Filesize

      4KB

    • memory/1088-58-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1928-422-0x0000000000BF0000-0x0000000000C70000-memory.dmp

      Filesize

      512KB

    • memory/1928-413-0x0000000001300000-0x0000000002008000-memory.dmp

      Filesize

      13.0MB

    • memory/1928-443-0x0000000000BF0000-0x0000000000C70000-memory.dmp

      Filesize

      512KB

    • memory/1928-444-0x0000000000BF0000-0x0000000000C70000-memory.dmp

      Filesize

      512KB

    • memory/1928-412-0x0000000000BF0000-0x0000000000C70000-memory.dmp

      Filesize

      512KB