Analysis
-
max time kernel
126s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2866daf2b59d9c34c891838c6bc10fb9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2866daf2b59d9c34c891838c6bc10fb9.exe
Resource
win10v2004-20231222-en
General
-
Target
2866daf2b59d9c34c891838c6bc10fb9.exe
-
Size
102KB
-
MD5
2866daf2b59d9c34c891838c6bc10fb9
-
SHA1
40ed0748dd9302a36ad6ea579f9ebffa2bacd7c4
-
SHA256
be8ad3c1c5d51fb5d29815a1b589f821ccb079649e4921c5925393c5a71b4540
-
SHA512
6a8325d07798d5475ef22d11a37a43105e006f0e88d1176e8e61cce5e8ab4c2f9a4f3c1c824839bf4f817d1f2fa22940ec0756f5da394ba63705f66f1f182616
-
SSDEEP
3072:iYcdZ28O5VIUUtxESoGxdHdyg2I/0nr1oEi:VEZcPIUkxESNYW
Malware Config
Extracted
crimsonrat
167.160.166.80
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
trbgertrnion.exepid Process 2232 trbgertrnion.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
trbgertrnion.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\vttbaelarvir = "C:\\ProgramData\\Hithviwia\\trbgertrnion.exe" trbgertrnion.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2866daf2b59d9c34c891838c6bc10fb9.exedescription ioc Process File created C:\PROGRA~3\HITHVI~1\trbgertrnion.exe 2866daf2b59d9c34c891838c6bc10fb9.exe File opened for modification C:\PROGRA~3\HITHVI~1\trbgertrnion.exe 2866daf2b59d9c34c891838c6bc10fb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2866daf2b59d9c34c891838c6bc10fb9.exedescription pid Process procid_target PID 2912 wrote to memory of 2232 2912 2866daf2b59d9c34c891838c6bc10fb9.exe 28 PID 2912 wrote to memory of 2232 2912 2866daf2b59d9c34c891838c6bc10fb9.exe 28 PID 2912 wrote to memory of 2232 2912 2866daf2b59d9c34c891838c6bc10fb9.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2866daf2b59d9c34c891838c6bc10fb9.exe"C:\Users\Admin\AppData\Local\Temp\2866daf2b59d9c34c891838c6bc10fb9.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\ProgramData\Hithviwia\trbgertrnion.exe"C:\ProgramData\Hithviwia\trbgertrnion.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5334547ca973dcdcc6f38f9f91e42ba38
SHA174745a8416c0d764cfcd51b6ae0c85e5a5eeedaf
SHA256e723131d2e9b2f1a9582f25e143af2716272ee4b04d252e5b825b76aa875ba53
SHA51209c928b88a9f95d224ce4b0fcac7e88b30d3373751b340b8b19df5a91530041439412f510d4766959df662b7bf616fde6fe015c6725bdda9c6c397b518478f99
-
Filesize
5.8MB
MD589169435194156207992708ec7c85076
SHA132ea501c4fc535b832fa335e0958538690f48a2d
SHA256791a53c28a7e07f7f8dd86f930a8f9a2d35a9a14f9ef601800702682ab63f87c
SHA512b962662f4325510cf000defc42040e8549f70d067f0a4131c8014d88bcdb2e64c0a30756c39d602b50b2d73bd818fb58c0e3c9a03613b14805812b07eda31b98
-
Filesize
6.3MB
MD5506ab7895138a334a0eba2f741b3fcbe
SHA18668eb1743c64b6fa47fbb8371b604281eff9adc
SHA256ba31aef36d65bccdb71a6b39ad38ffa2fa29422be64d89b0ea5054ed4cfba6d7
SHA51294b8aea9daa15d1dbdd3da21ab3d38d8d48342855be8052d39c945a5fc633990a5c42859f927f0d4a1a510b4cd5dca86a956961f3cbe5bc2736799ea8bb15556
-
Filesize
7.1MB
MD50b670133df2671ff6c8534ee6f20339d
SHA15d3fc9256eb19d6998f3628e4c7f3461c28bac20
SHA25651938e935c384da82e7831cbd9a881f9eec7e9c7f11e6824e26359f85ede4221
SHA512ce48f3dd1c85606784568eff31286f65fc96c0dc1160451ce47b2d6906778139b19200c5fa468bec31b0efaa13de3f3aa15549eab4d552917d5950781922fb0c
-
Filesize
65KB
MD558bb8eac1f3b88d703f72c182c12ffe1
SHA16abd5a836d400edccadedff2878f7f3a581d5c6d
SHA2567769437bbe55ff4f377ade33472c67dba2527c82c830bb2e41a2512f1c906913
SHA51233e1a4b47e0321acd6f8a60f105cf905bf6be52ba995be17b89053f1dba71f87d1d176b969d64556f469a389575955d48414be6b4015178633150d6c05cedb43