Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2023 16:12

General

  • Target

    netflix_christmas_offer_for_old_users.xlam

  • Size

    5.1MB

  • MD5

    9f066a62e22b98b0fad7fedfdee68b52

  • SHA1

    e82bda281cd56e2515f3b351f8cb7d074986ed13

  • SHA256

    2b7c1c57725451109a1a9217aa02507a0f37e67b46f91d5d153bbb1d0e4122b4

  • SHA512

    53f1e9944ee3ee547900efca6b6a23e735d82b63c9e753c3b81de53a1bf113e81733ba79976f9a469c698dc79b88d34faec6dbc23561878c18242389685b0f4f

  • SSDEEP

    98304:jV4oyAgZvd4DsMtu/oYUT5FWSQERe4QBUfX9I5CvKc4lROdy60zQ:RPiKDu/7QZQ2HQUfX6gN4lROdZ0zQ

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

167.160.166.1

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\netflix_christmas_offer_for_old_users.xlam
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\Documents\221612\jevisvmnrav.com
      C:\Users\Admin\Documents\221612\jevisvmnrav.com
      2⤵
      • Executes dropped EXE
      PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\DOCUME~1\221612\OLEOBJ~1.ZIP

    Filesize

    124KB

    MD5

    96c67b4a037732b008466568e2a70a4e

    SHA1

    a40ffacd71fdfd06be04643af03929f5be41f039

    SHA256

    576935e605536e659442439e016bf05e68d3d556bf3978e63fe3cc0be609a71d

    SHA512

    8e4ba719b276c74c68d1464968e819323bd74a3f2a0a46732b6ceee6cd1ee7118cccd2bb3eb0a71c08fac37aeb59b6a5b5446a1ec3d1d5d9b63845042988e204

  • C:\Users\Admin\DOCUME~1\221612\dockes.zip

    Filesize

    5.1MB

    MD5

    9f066a62e22b98b0fad7fedfdee68b52

    SHA1

    e82bda281cd56e2515f3b351f8cb7d074986ed13

    SHA256

    2b7c1c57725451109a1a9217aa02507a0f37e67b46f91d5d153bbb1d0e4122b4

    SHA512

    53f1e9944ee3ee547900efca6b6a23e735d82b63c9e753c3b81de53a1bf113e81733ba79976f9a469c698dc79b88d34faec6dbc23561878c18242389685b0f4f

  • C:\Users\Admin\DOCUME~1\221612\xl\WORKSH~1\_rels\sheet3.xml.rels

    Filesize

    299B

    MD5

    84544d82569111767d12019e66416d1e

    SHA1

    6f95f4be0de5b2ef6749e80f11813f84473f32e1

    SHA256

    ee9fa12d10c5ee0ae23c711aad3be36f1d99d87934a588aac4ecaf1028bdef16

    SHA512

    018bd3043fa87934e782e035b97ec39c21d7f3fd3e2f54ef8fe1d9dc48c127360ba4b2f97c7bff3c06c2395f13ac1039bfefecbada55df7c688eda8a372fe422

  • C:\Users\Admin\Documents\221612\dockes.zip:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\Documents\221612\jevisvmnrav.com

    Filesize

    192KB

    MD5

    6220d266ece336bcf8d4ca9985d1aee2

    SHA1

    1567192fe8063a01b0f46cf2eb3d6def649f2935

    SHA256

    b35fd388ab5837b30e917aec7df6a319ed46e6f217e1387767d34d4ddcbe7e17

    SHA512

    7839f5368e05eee023101de5872ee41f0f916948453af50d5ce08f4089f282d07a1093ba7484300bd2e4457b3d598765ec2f09f05319a0513441751924c0af30

  • C:\Users\Admin\Documents\221612\jevisvmnrav.com

    Filesize

    7.0MB

    MD5

    dc19638e9e08de984a17272e00cbbd11

    SHA1

    65f963ac9f02e860e58fafbaeec543c2ab05cc5c

    SHA256

    940135a4cebf834f9a16e5d7831bd325be334aec9937a761ec60900ee495e976

    SHA512

    de2c6e642812e175c0f7732b7f27e4a72c719541972c79dba9e8bb709241f4ee2e734808c2531baf5b74eb0cb4a62ff7883c08a6050dfa48d2a09e80564c63fe

  • C:\Users\Admin\Documents\221612\xl\jevisvmnrav.zip

    Filesize

    124KB

    MD5

    4ba87cb59ad69ca70246cbdeef80d5d0

    SHA1

    9ac22b4b3f15594f79f338bd1c52bc38637dc00d

    SHA256

    bf9035b7bab9ff7be87b53d535d76df66b2101f067f3f11ffe67d0865f115ac4

    SHA512

    3edfad2e8bcf58b6d73050c62bb94121f52e18d3536151d01855b6b3aae772ec18d9036fc4ab854a44b5e0c013c78fac3d8fbe03a4ce606537e3b0cc07606d56

  • C:\Users\Admin\Documents\netflix_christmas_offer_for_old_users.xlam.xlsx

    Filesize

    11KB

    MD5

    b690ff9f6d3b668858d825fa0ce69ed4

    SHA1

    782547cebe8aba85029cde0cd8b3debf9a7b7f14

    SHA256

    01654630570ca2104b401436f82831bf04e284eaf983e1db4443d44969494ad2

    SHA512

    dc42ac00ed88f321648dca7feb7ce80c38c835f7294651104d60a757a5641e612f90ff2edeceb2a734924cf21d584b336f73f05b320dd3f15f97040c2b59843e

  • \Users\Admin\Documents\221612\jevisvmnrav.com

    Filesize

    576KB

    MD5

    ec80ac3bd9453936f7e14c8c7f8bed38

    SHA1

    350f2f31dc912af51d7cc26279557e93661e1e5e

    SHA256

    eb125ccbeb6a927baa272416acaeada51e2293f05f12a4fac6849d81650c3480

    SHA512

    5afbde343dd772ec44c787d26ab3daadd2402adf6a930332a9fd2b282010036c74ccb2ff5342956b8dfbc269297fce030de63dc004f6bd90b9768925b3bcdcda

  • memory/1140-472-0x00000000000F0000-0x00000000011E0000-memory.dmp

    Filesize

    16.9MB

  • memory/1140-473-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1140-474-0x000000001C2E0000-0x000000001C360000-memory.dmp

    Filesize

    512KB

  • memory/1140-488-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1140-489-0x000000001C2E0000-0x000000001C360000-memory.dmp

    Filesize

    512KB

  • memory/1860-7-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-10-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-16-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-18-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-17-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-15-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-63-0x00000000031D0000-0x00000000031D1000-memory.dmp

    Filesize

    4KB

  • memory/1860-13-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-12-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-11-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-8-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1860-9-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-14-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-5-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-6-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-3-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-4-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-485-0x00000000721FD000-0x0000000072208000-memory.dmp

    Filesize

    44KB

  • memory/1860-486-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-487-0x00000000031D0000-0x00000000031D1000-memory.dmp

    Filesize

    4KB

  • memory/1860-2-0x0000000000440000-0x0000000000540000-memory.dmp

    Filesize

    1024KB

  • memory/1860-1-0x00000000721FD000-0x0000000072208000-memory.dmp

    Filesize

    44KB

  • memory/1860-494-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1860-495-0x00000000721FD000-0x0000000072208000-memory.dmp

    Filesize

    44KB