Analysis

  • max time kernel
    147s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2023 07:27

General

  • Target

    f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm

  • Size

    129KB

  • MD5

    d6cf93b031f2e3b8758c41f5ce665a1f

  • SHA1

    dd3040f2b246bf729de40573721442d8efd4e070

  • SHA256

    f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea

  • SHA512

    1e118d5bf9c18286c7005670d3212f042d32e18004d7e5b7840380490df2fe73e3e59dcabbd6cf90e1d95357e548a3f3aee05cff895af93415e0bc69e00d3680

  • SSDEEP

    3072:FyZLYyIKIfKTzY+J4WRyasXGcSOv+zb4coB168mOKIGuH+dyRwKyR7Ep:FMLNWK/Y24WK2cbv+ol03K+qwHY

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

172.245.80.12

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\Ms Word_54\jedvmtrvh.exe
      "C:\Users\Admin\Ms Word_54\jedvmtrvh.exe"
      2⤵
      • Executes dropped EXE
      PID:1628
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1696

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\Documents\f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea.docm.docx

      Filesize

      20KB

      MD5

      cd7c56daa6b18500aaff80cbe9569d67

      SHA1

      82152bfacfc4262eed634a46a727eb7b26dcf50b

      SHA256

      4f5b450af343d4405de13d65a3be4001df383dd7a82e66d36c7d18f9c93b2dbd

      SHA512

      c59d77260578d46baa56635caf810d82118942479c791604926ca455d71d496afe62c7e9bd53a37a929996237d54c61c0c359b1b37aa44851d6cc500ba3a1717

    • C:\Users\Admin\MSWORD~1\docks.zip

      Filesize

      129KB

      MD5

      d6cf93b031f2e3b8758c41f5ce665a1f

      SHA1

      dd3040f2b246bf729de40573721442d8efd4e070

      SHA256

      f77205a9238a123b74b764be6e2132777e1f3eda9c515f31219387c45629e3ea

      SHA512

      1e118d5bf9c18286c7005670d3212f042d32e18004d7e5b7840380490df2fe73e3e59dcabbd6cf90e1d95357e548a3f3aee05cff895af93415e0bc69e00d3680

    • C:\Users\Admin\Ms Word_54\docks.zip:Zone.Identifier

      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • C:\Users\Admin\Ms Word_54\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_54\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_54\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • C:\Users\Admin\Ms Word_54\word\jedvmtrvh.zip

      Filesize

      255KB

      MD5

      c7026aa76880ff7e889deaf6e2b416b1

      SHA1

      23c5c5d462edc2e0bc3b920dd34c1c30c793cc54

      SHA256

      da757853f4940996087b6755dd65eba3c9c5bdce29deebf5ded92e752ab6896c

      SHA512

      ee477813db63842307a8e45c00a6cd2a378feb3fa26d425703e8a3b839be365db05dd64aba47ccc709232f9f50fd87685c30ba038d0d7145a75f6241cbadc74e

    • \Users\Admin\Ms Word_54\jedvmtrvh.exe

      Filesize

      13.0MB

      MD5

      827a3da12d83683d326d81c058c656ac

      SHA1

      3a988412a95d7129c6346a12336a6e3597a48f49

      SHA256

      6d372ac5ea7270b83a04ef72eaed5a87258cf612f4c52e4dd2a7e073e5913c5c

      SHA512

      142327a65bda6ac785908cc671d8c5a0c5418b651be789a0e442ede4a0d18cb0c25290f4f8edcc90e63c7be18ff2f2b556667cb2294af2a56df10b4243d91dec

    • memory/1628-452-0x00000000005D0000-0x0000000000650000-memory.dmp

      Filesize

      512KB

    • memory/1628-412-0x00000000005D0000-0x0000000000650000-memory.dmp

      Filesize

      512KB

    • memory/1628-413-0x00000000012B0000-0x0000000001FB8000-memory.dmp

      Filesize

      13.0MB

    • memory/1628-421-0x00000000005D0000-0x0000000000650000-memory.dmp

      Filesize

      512KB

    • memory/1628-453-0x00000000005D0000-0x0000000000650000-memory.dmp

      Filesize

      512KB

    • memory/1996-62-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-119-0x0000000004D70000-0x0000000004D71000-memory.dmp

      Filesize

      4KB

    • memory/1996-68-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-66-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-67-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-65-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-64-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1996-63-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-61-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-442-0x0000000004D70000-0x0000000004D71000-memory.dmp

      Filesize

      4KB

    • memory/1996-60-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-59-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-58-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-57-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB