Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 12:34
Static task
static1
Behavioral task
behavioral1
Sample
d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33.docm
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33.docm
Resource
win10v2004-20230703-en
General
-
Target
d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33.docm
-
Size
153KB
-
MD5
44c494a30f83f92295c8351b86a2507a
-
SHA1
72b49464d5ff0e6aa85fc94284ffc75a546c8c8c
-
SHA256
d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33
-
SHA512
7b3f4bff12267827f9da31b6a1002bc272a64de2def2109a997d69d009555bd97410625f773ed92283477e2ca1f42a71af7e3c4e943ced6b509349e868871ccc
-
SSDEEP
3072:F6sZMeRby4a1enUyvAGJYmjeT7rUsmI1XMjPuyXTV5Q5Cm7FTltM:F1ZMeFyLenUZGChzmI1aRXT8V5lC
Malware Config
Extracted
crimsonrat
173.232.44.69
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
govate wgte.exepid Process 2220 govate wgte.exe -
Loads dropped DLL 1 IoCs
Processes:
WINWORD.EXEpid Process 2400 WINWORD.EXE -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File created C:\Users\Admin\office_word_7\docksx\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 2400 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
WINWORD.EXEpid Process 2400 WINWORD.EXE 2400 WINWORD.EXE 2400 WINWORD.EXE 2400 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid Process 2400 WINWORD.EXE 2400 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WINWORD.EXEdescription pid Process procid_target PID 2400 wrote to memory of 2220 2400 WINWORD.EXE 29 PID 2400 wrote to memory of 2220 2400 WINWORD.EXE 29 PID 2400 wrote to memory of 2220 2400 WINWORD.EXE 29 PID 2400 wrote to memory of 2220 2400 WINWORD.EXE 29 PID 2400 wrote to memory of 2304 2400 WINWORD.EXE 32 PID 2400 wrote to memory of 2304 2400 WINWORD.EXE 32 PID 2400 wrote to memory of 2304 2400 WINWORD.EXE 32 PID 2400 wrote to memory of 2304 2400 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33.docm"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\office_word_7\govate wgte.exe"C:\Users\Admin\office_word_7\govate wgte.exe"2⤵
- Executes dropped EXE
PID:2220
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a8b3b13f4499d6a17362d893fe461a56
SHA1c0b566ed1cf4e1a03592101862a31163a6a120ca
SHA256b78a556edf0af9a4068699654c6925480b4d53db2c46e46464e531ccee3531f9
SHA51295b51e081a9eb77c173068eca97934568e2f0e240b5af43cf314976eb61dbbb26ac15c5e3f8b883f43263b1a5809f7d3640333cee64cfc34ad511de58284f1b4
-
Filesize
153KB
MD544c494a30f83f92295c8351b86a2507a
SHA172b49464d5ff0e6aa85fc94284ffc75a546c8c8c
SHA256d47528c5574e307dd79fb7c240fcc4d22397671f3eb4a1dc990b64971c588d33
SHA5127b3f4bff12267827f9da31b6a1002bc272a64de2def2109a997d69d009555bd97410625f773ed92283477e2ca1f42a71af7e3c4e943ced6b509349e868871ccc
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
19.6MB
MD5b63fd1d2717071eca5b95db0bda74f26
SHA165742d5f8ae4df7edf07bbf4a4040f40cb4535fd
SHA25686eccc88dcae9d1890a43f35b1a30c63b19176f5bff371b21588ee4a7519ab56
SHA512b2cfcef5dce12bab4a1aa9d4c0172980423a7acee3fea78b868aaec46740936375cc0fc570e22c847a2c228a7ff44cfe1bdb2b83b42346ef5c20f69b6cafe9da
-
Filesize
19.6MB
MD5b63fd1d2717071eca5b95db0bda74f26
SHA165742d5f8ae4df7edf07bbf4a4040f40cb4535fd
SHA25686eccc88dcae9d1890a43f35b1a30c63b19176f5bff371b21588ee4a7519ab56
SHA512b2cfcef5dce12bab4a1aa9d4c0172980423a7acee3fea78b868aaec46740936375cc0fc570e22c847a2c228a7ff44cfe1bdb2b83b42346ef5c20f69b6cafe9da
-
Filesize
19.6MB
MD5b63fd1d2717071eca5b95db0bda74f26
SHA165742d5f8ae4df7edf07bbf4a4040f40cb4535fd
SHA25686eccc88dcae9d1890a43f35b1a30c63b19176f5bff371b21588ee4a7519ab56
SHA512b2cfcef5dce12bab4a1aa9d4c0172980423a7acee3fea78b868aaec46740936375cc0fc570e22c847a2c228a7ff44cfe1bdb2b83b42346ef5c20f69b6cafe9da
-
Filesize
307KB
MD5fb1d84ef4d34e2f2f1e7fb3966123082
SHA1dea875a6f98e627c18c3de62d69ee24a8082b9b2
SHA256e01812afc5b635772b92c34dcde40131655679396f53efd14577df6b615cf7ac
SHA5125c5f1192cbc9153c81f40b44f27299f8c2251792af9527b0547d54d76c79359d26e68c13de370e38eae1688313d77c5f02a81b0479f4bf0f423490f3844539aa
-
Filesize
19.6MB
MD5b63fd1d2717071eca5b95db0bda74f26
SHA165742d5f8ae4df7edf07bbf4a4040f40cb4535fd
SHA25686eccc88dcae9d1890a43f35b1a30c63b19176f5bff371b21588ee4a7519ab56
SHA512b2cfcef5dce12bab4a1aa9d4c0172980423a7acee3fea78b868aaec46740936375cc0fc570e22c847a2c228a7ff44cfe1bdb2b83b42346ef5c20f69b6cafe9da