Resubmissions

15-11-2023 08:58

231115-kw7ssafc93 10

14-11-2023 09:28

231114-lfdqfaba74 10

Analysis

  • max time kernel
    144s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 08:58

General

  • Target

    a0632cecfd478fbef1a69daae3d760041c6af2cc88965633d3837e076793cc82.xlam

  • Size

    3.4MB

  • MD5

    41d801d96c9e27c5ca6c4678ffa2d7e2

  • SHA1

    f8c6b5b4c520c2416bea015451cc8aca3283abe6

  • SHA256

    a0632cecfd478fbef1a69daae3d760041c6af2cc88965633d3837e076793cc82

  • SHA512

    58bfe64961ed881bb1489a5e298f4302d26568c770b5422aff36952514c33c91b588a000554e75581939b98185d2ca7681042e288215e8d62468f028bf8c847c

  • SSDEEP

    98304:Wal3ZM+KyXAQ5036pRV4sWWL4lxoeF35abXerDX6:dM+Kg503C74uL4XD8qK

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

64.188.21.202

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\a0632cecfd478fbef1a69daae3d760041c6af2cc88965633d3837e076793cc82.xlam
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\Downloads\844\itugpisacrev.com
      C:\Users\Admin\Downloads\844\itugpisacrev.com
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\DOWNLO~1\844\OLEOBJ~1.ZIP

      Filesize

      3.5MB

      MD5

      22ec8f10e85d07c61783da6ef409b698

      SHA1

      0f1c60575fd3d3e78d8b8d677de32d4a3547ffec

      SHA256

      64c23c177bbeca04906058918c26b80b2fee7774f9ad3682bf14142c8fc32fb0

      SHA512

      8f53f8e29c73fbaf5867b0c55fbf57c1e3a7f1d59008a379b37f0649d7f3660d31ea4d047256dc7d728ed79ae54ebe928eed631a247ec2ae6e84f5e92b44ef70

    • C:\Users\Admin\DOWNLO~1\844\mydocs.zip

      Filesize

      3.4MB

      MD5

      41d801d96c9e27c5ca6c4678ffa2d7e2

      SHA1

      f8c6b5b4c520c2416bea015451cc8aca3283abe6

      SHA256

      a0632cecfd478fbef1a69daae3d760041c6af2cc88965633d3837e076793cc82

      SHA512

      58bfe64961ed881bb1489a5e298f4302d26568c770b5422aff36952514c33c91b588a000554e75581939b98185d2ca7681042e288215e8d62468f028bf8c847c

    • C:\Users\Admin\Downloads\844\itugpisacrev.com

      Filesize

      22.4MB

      MD5

      c9c802bb6fcfa1c4922fa637a3a8dca1

      SHA1

      fc2a1974925addc9164e9488a5805bb9c397d5e0

      SHA256

      73d192b9b79df57932eb153eb5f6f8c999c9297d54768367a3ecf002950f0bae

      SHA512

      736e2a7a96afb7b7b081352f41da6c21a1015b11e24345e14900e8ea1de55da071cea5ed3e8e0cc80dbe51c61cdf1d5eeef35545ac5ce934dccaf61c4ee48d11

    • C:\Users\Admin\Downloads\844\itugpisacrev.com

      Filesize

      22.4MB

      MD5

      c9c802bb6fcfa1c4922fa637a3a8dca1

      SHA1

      fc2a1974925addc9164e9488a5805bb9c397d5e0

      SHA256

      73d192b9b79df57932eb153eb5f6f8c999c9297d54768367a3ecf002950f0bae

      SHA512

      736e2a7a96afb7b7b081352f41da6c21a1015b11e24345e14900e8ea1de55da071cea5ed3e8e0cc80dbe51c61cdf1d5eeef35545ac5ce934dccaf61c4ee48d11

    • C:\Users\Admin\Downloads\844\itugpisacrev.com

      Filesize

      22.4MB

      MD5

      c9c802bb6fcfa1c4922fa637a3a8dca1

      SHA1

      fc2a1974925addc9164e9488a5805bb9c397d5e0

      SHA256

      73d192b9b79df57932eb153eb5f6f8c999c9297d54768367a3ecf002950f0bae

      SHA512

      736e2a7a96afb7b7b081352f41da6c21a1015b11e24345e14900e8ea1de55da071cea5ed3e8e0cc80dbe51c61cdf1d5eeef35545ac5ce934dccaf61c4ee48d11

    • C:\Users\Admin\Downloads\844\mydocs.zip:Zone.Identifier

      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • C:\Users\Admin\Downloads\844\xl\embeddings\itugpisacrev.zip

      Filesize

      3.5MB

      MD5

      c01bae9b26a56b279615f4fe3ed44421

      SHA1

      7c4bcb10945441a46241859da769e6ff767a81b9

      SHA256

      eda677d25eea548857ac2cf803e652f776285418e4520dc005b4492c913ecb01

      SHA512

      1a90139d7d666c52f2f730d9c70df4d8735828fda17b232216b5d7bb83d0009d9fd51bd09a46c7f8a4d2051ed06ad6fca127a1438b43362988da84fed1dacaeb

    • C:\Users\Admin\Downloads\a0632cecfd478fbef1a69daae3d760041c6af2cc88965633d3837e076793cc82.xlam.xlsx

      Filesize

      15KB

      MD5

      e6e7f06b649fc6df7f948d3450a7b344

      SHA1

      fb591934229a5ad5b1aa010d99e9f64fb7dfc9ca

      SHA256

      74e119c485fb71f3b5d5e64a271b8dd8299db5833612aa78400223c2064b2732

      SHA512

      cac4367865c55cb1c4490be6d53ea6a9de36b8360aa74e86118e353c369b4abb065174047c8c83ff7b6cb27d74f6400b51eea296a94b795bc5c9a6e5aac1c7d2

    • \Users\Admin\Downloads\844\itugpisacrev.com

      Filesize

      22.4MB

      MD5

      c9c802bb6fcfa1c4922fa637a3a8dca1

      SHA1

      fc2a1974925addc9164e9488a5805bb9c397d5e0

      SHA256

      73d192b9b79df57932eb153eb5f6f8c999c9297d54768367a3ecf002950f0bae

      SHA512

      736e2a7a96afb7b7b081352f41da6c21a1015b11e24345e14900e8ea1de55da071cea5ed3e8e0cc80dbe51c61cdf1d5eeef35545ac5ce934dccaf61c4ee48d11

    • memory/2096-356-0x000007FEF5110000-0x000007FEF5AFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2096-346-0x00000000003B0000-0x0000000001A28000-memory.dmp

      Filesize

      22.5MB

    • memory/2096-359-0x000000001CC80000-0x000000001CD00000-memory.dmp

      Filesize

      512KB

    • memory/2096-360-0x000000001CC80000-0x000000001CD00000-memory.dmp

      Filesize

      512KB

    • memory/2096-365-0x000007FEF5110000-0x000007FEF5AFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2096-366-0x000000001CC80000-0x000000001CD00000-memory.dmp

      Filesize

      512KB

    • memory/2096-367-0x000000001CC80000-0x000000001CD00000-memory.dmp

      Filesize

      512KB

    • memory/2096-368-0x000000001CC80000-0x000000001CD00000-memory.dmp

      Filesize

      512KB

    • memory/2808-12-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-11-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-18-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-53-0x0000000003020000-0x0000000003021000-memory.dmp

      Filesize

      4KB

    • memory/2808-16-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-15-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-14-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-9-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-10-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-13-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2808-17-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-8-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-7-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-3-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-5-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-361-0x0000000071DAD000-0x0000000071DB8000-memory.dmp

      Filesize

      44KB

    • memory/2808-362-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-363-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-364-0x0000000003020000-0x0000000003021000-memory.dmp

      Filesize

      4KB

    • memory/2808-6-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-4-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-2-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2808-1-0x0000000071DAD000-0x0000000071DB8000-memory.dmp

      Filesize

      44KB