Analysis

  • max time kernel
    123s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:20

General

  • Target

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404_JC.docm

  • Size

    4.6MB

  • MD5

    22ce9042f6f78202c6c346cef1b6e532

  • SHA1

    b67712125dce3f8b5d197fcc46aaf627da2fb7eb

  • SHA256

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404

  • SHA512

    0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865

  • SSDEEP

    98304:JWnSXYZsDL1nxNUQfbqKh1nshu8JOH0sLbl9t0/ZwiwrYSMlGortsUDIS7JuLYsa:0niUs39sQeK8uY+Jl9MZwdrDMlGorts2

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

162.245.191.217

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404_JC.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\Wrdix17\vteijam hdgtra.exe
      "C:\Users\Admin\Wrdix17\vteijam hdgtra.exe"
      2⤵
      • Executes dropped EXE
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8267BDBC.png

    Filesize

    176B

    MD5

    a9cf5a05a009c224bb6a1eae6edb2af6

    SHA1

    a20a33b3e923fe851d0bffd6bf4204267ce15614

    SHA256

    bf4f7e58f204c63c081988069d298ccbb09638d225579924c0d74731784013f7

    SHA512

    d4199e058db4393b1528106e13fbb49c5c7019302817dda9d8b1ffb9b8c67eeda41fae7cbe9e2b20f74206fce3954f86249cd88390c8295e97ae9ab99aaaeb66

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90AD48E7.png

    Filesize

    1KB

    MD5

    fcf7aca9ef3ef128bae0f0a6359ced50

    SHA1

    a7c51e9af08284373644b3a93c0e4a4c659e5fc2

    SHA256

    f7af856d2330e148621403f404dd9b64abb6f242af2d00e8f4c545aaf125bfde

    SHA512

    5b888834474f77234f5689b189ac4810f0e5aaec6ed87c5e8afb37765ce4f012043d4448b0bb62c404b53d5367fbf8b92f4671dea8f4628f7c5df78694c89e80

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\922E926B.png

    Filesize

    171B

    MD5

    6e7e9038f1b6b12632cdecb3e6ed8d27

    SHA1

    2058595527b869e7e5a290fd53fd76b9ca391ebe

    SHA256

    793bddf94b4e62ad0e2fe3c24f90217da88d1786fc36cde93997e0d9c45e1cf6

    SHA512

    3313334dfd533cd5fabb0e003269a7f6e8e4787e31649516cd12d07fa40c830cf53dc06d8cf3e2850c6df2280ae54286433472e72c166a5dea437116f97de4ae

  • C:\Users\Admin\Documents\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404_JC.docm.docx

    Filesize

    117KB

    MD5

    efed06b2fd437d6008a10d470e2c519f

    SHA1

    f23dc3a76b73df7e4e73c34497681805e823c09f

    SHA256

    858fa6814f8393cfaaee59ccf303cf26b18b3d7e8a2471785c733784083b602d

    SHA512

    58d6ea94cfd431c2cee2944579d0f29f14b8fd2d9cf674ac18ba3f894cfe7c34e1e8520b217194c83ec47ff295f37b4fbd479a7e81f7f3f296f60c2625dd0618

  • C:\Users\Admin\Wrdix17\domcxs.zip

    Filesize

    4.6MB

    MD5

    22ce9042f6f78202c6c346cef1b6e532

    SHA1

    b67712125dce3f8b5d197fcc46aaf627da2fb7eb

    SHA256

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404

    SHA512

    0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865

  • C:\Users\Admin\Wrdix17\domcxs.zip:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\Wrdix17\vteijam hdgtra.exe

    Filesize

    11.8MB

    MD5

    59211a4e0f27d70c659636746b61945a

    SHA1

    3d36859ee1e073282f327ede208e0cab05cb25f1

    SHA256

    2110af4e9c7a4f7a39948cdd696fcd8b4cdbb7a6a5bf5c5a277b779cc1bf8577

    SHA512

    b43c1083be7bea0821550226cc2e9824a97adc084987b8dfe6c995e57ac84fe3da774bda06362ec6c95ef5ef5e2a4b857db4d378fe402a3927109a2d1c24217d

  • C:\Users\Admin\Wrdix17\vteijam hdgtra.exe

    Filesize

    11.8MB

    MD5

    59211a4e0f27d70c659636746b61945a

    SHA1

    3d36859ee1e073282f327ede208e0cab05cb25f1

    SHA256

    2110af4e9c7a4f7a39948cdd696fcd8b4cdbb7a6a5bf5c5a277b779cc1bf8577

    SHA512

    b43c1083be7bea0821550226cc2e9824a97adc084987b8dfe6c995e57ac84fe3da774bda06362ec6c95ef5ef5e2a4b857db4d378fe402a3927109a2d1c24217d

  • C:\Users\Admin\Wrdix17\vteijam hdgtra.exe

    Filesize

    11.8MB

    MD5

    59211a4e0f27d70c659636746b61945a

    SHA1

    3d36859ee1e073282f327ede208e0cab05cb25f1

    SHA256

    2110af4e9c7a4f7a39948cdd696fcd8b4cdbb7a6a5bf5c5a277b779cc1bf8577

    SHA512

    b43c1083be7bea0821550226cc2e9824a97adc084987b8dfe6c995e57ac84fe3da774bda06362ec6c95ef5ef5e2a4b857db4d378fe402a3927109a2d1c24217d

  • C:\Users\Admin\Wrdix17\word\vteijam hdgtra.zip

    Filesize

    4.6MB

    MD5

    e31ac765d1e97698bc1efe443325e497

    SHA1

    930e2525c58d7509826be955f6d24b24370f7b25

    SHA256

    ce556d55e07bf6b57e3e086e57e9c52552ac7f00adf4a7c9f99bbc21a5ac26c2

    SHA512

    d11088e02895452a1af0df8e47449aa3150fa8c3c671bf2cd75a45c3e17ad816686dd765b7734d3310d55756ee50db3d5312e89259a10987d4bfe8354b4c98d1

  • \Users\Admin\Wrdix17\vteijam hdgtra.exe

    Filesize

    11.8MB

    MD5

    59211a4e0f27d70c659636746b61945a

    SHA1

    3d36859ee1e073282f327ede208e0cab05cb25f1

    SHA256

    2110af4e9c7a4f7a39948cdd696fcd8b4cdbb7a6a5bf5c5a277b779cc1bf8577

    SHA512

    b43c1083be7bea0821550226cc2e9824a97adc084987b8dfe6c995e57ac84fe3da774bda06362ec6c95ef5ef5e2a4b857db4d378fe402a3927109a2d1c24217d

  • memory/2012-367-0x0000000002AC0000-0x0000000002B40000-memory.dmp

    Filesize

    512KB

  • memory/2012-366-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-369-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-371-0x0000000002AC0000-0x0000000002B40000-memory.dmp

    Filesize

    512KB

  • memory/2012-449-0x000007FEF5830000-0x000007FEF61CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2012-450-0x0000000002AC0000-0x0000000002B40000-memory.dmp

    Filesize

    512KB

  • memory/3044-14-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-368-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

    Filesize

    44KB

  • memory/3044-21-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-20-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-61-0x0000000004C10000-0x0000000004C11000-memory.dmp

    Filesize

    4KB

  • memory/3044-17-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-19-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-16-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-12-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-15-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-13-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-0-0x000000002F371000-0x000000002F372000-memory.dmp

    Filesize

    4KB

  • memory/3044-11-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-18-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-10-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-9-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-8-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-378-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-7-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-6-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-5-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-443-0x0000000000510000-0x0000000000610000-memory.dmp

    Filesize

    1024KB

  • memory/3044-448-0x0000000004C10000-0x0000000004C11000-memory.dmp

    Filesize

    4KB

  • memory/3044-2-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

    Filesize

    44KB

  • memory/3044-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB