Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2023 01:48

General

  • Target

    itugpisacrev.com.exe

  • Size

    22.4MB

  • MD5

    c9c802bb6fcfa1c4922fa637a3a8dca1

  • SHA1

    fc2a1974925addc9164e9488a5805bb9c397d5e0

  • SHA256

    73d192b9b79df57932eb153eb5f6f8c999c9297d54768367a3ecf002950f0bae

  • SHA512

    736e2a7a96afb7b7b081352f41da6c21a1015b11e24345e14900e8ea1de55da071cea5ed3e8e0cc80dbe51c61cdf1d5eeef35545ac5ce934dccaf61c4ee48d11

  • SSDEEP

    98304:Ite360HKzJ16ZBYp5zM/WCasNnTaiJVsv8nn9+SOOhR:IO6IKj6r+5zsWlsN2iVNnn

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

64.188.21.202

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\itugpisacrev.com.exe
    "C:\Users\Admin\AppData\Local\Temp\itugpisacrev.com.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2464-2-0x000000001C840000-0x000000001C8C0000-memory.dmp

    Filesize

    512KB

  • memory/2464-1-0x0000000001150000-0x00000000027C8000-memory.dmp

    Filesize

    22.5MB

  • memory/2464-0-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2464-3-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2464-4-0x000000001C840000-0x000000001C8C0000-memory.dmp

    Filesize

    512KB

  • memory/2464-5-0x000000001C840000-0x000000001C8C0000-memory.dmp

    Filesize

    512KB

  • memory/2464-6-0x000000001C840000-0x000000001C8C0000-memory.dmp

    Filesize

    512KB