Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 14:28

General

  • Target

    dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.doc

  • Size

    790KB

  • MD5

    c7a3276763a5c1b13f93028aab5a6e73

  • SHA1

    c2844b69a36b3be37f8db97b0afc051f6bf36671

  • SHA256

    dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676

  • SHA512

    2ef8d3eb3f1368591666d9f85dddb210c05fe16569f3553086f42d7b82133669c5a9e7fe1263407bb54bb9f75216ef9fcb78348427e334ef74afd6e3f429c01a

  • SSDEEP

    3072:PkWc08tG41FHiopEomJ9/GuloC5pUAn0YoKpbqZSvYYzU6lXHaym97m/EE3fzLvd:PkA

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

151.106.14.125

211.210.122.154

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dbb9168502e819619e94d9dc211d5f4967d8083ac5f4f67742b926abb04e6676.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\ProgramData\Dlymrdsa\ravidhtirad.exe
      C:\ProgramData\Dlymrdsa\ravidhtirad.exe
      2⤵
      • Executes dropped EXE
      PID:2596
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~3\Dlymrdsa\RAVIDH~1.ZIP

      Filesize

      100KB

      MD5

      e8d43c7169b8a59d9b030bab911f0aea

      SHA1

      3cdd51c588f2c86ac547160f8b6674a3342a35d3

      SHA256

      b741ac11113febcd1213675b51e55ffd2dda70099a01aede3c82b57e833840ba

      SHA512

      4bcf0805f539766da8a0a592f5b4d577fd9a5ef45f32256afe958c36c78ebd0c41649d347e61f3a53db07322808f03a84fda4c8be5b2e58ae567f4eddfafbc26

    • C:\ProgramData\Dlymrdsa\ravidhtirad.exe

      Filesize

      9.2MB

      MD5

      938770e6e69e6feadb1b9f63af9969f4

      SHA1

      4a4f4aac7bd4212762bb26b1bda882d44c7956a8

      SHA256

      bbea096ceb3c94454a5b92e5f614f107bd98df0b9d2f7022574256d0614f35c8

      SHA512

      383d8381409fdcfaf9632473c3a40f20d887326f452823ca754780c8bbd1879c42dd0d3574dc833a2f98f6e5adfe5c31786654a7252e4ad39770d164feb957dc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      302fd76bc39e2d45eff1df5b32b4665d

      SHA1

      5335342a39af3bfcbd796ec6be30b5b0bcc55d59

      SHA256

      179dec0c3a11ce3501f469c9c0865ac4afd98a100976320d40f4208f3297b2b2

      SHA512

      1ed69112a13c8196c07e7652595603c503574fd6a3c9d77dac06db9798f6064e785a3bcdf323b96d0888eff32b01907b1d80ef50da268ce836f79968af11bce9

    • memory/1328-49-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-85-0x000000007185D000-0x0000000071868000-memory.dmp

      Filesize

      44KB

    • memory/1328-8-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-12-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-22-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-6-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-29-0x0000000005FF0000-0x0000000005FF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-2-0x000000007185D000-0x0000000071868000-memory.dmp

      Filesize

      44KB

    • memory/1328-86-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-67-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-84-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1328-0-0x000000002F911000-0x000000002F912000-memory.dmp

      Filesize

      4KB

    • memory/1328-52-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-7-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-55-0x000000007185D000-0x0000000071868000-memory.dmp

      Filesize

      44KB

    • memory/1328-60-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-61-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-62-0x00000000055D0000-0x00000000056D0000-memory.dmp

      Filesize

      1024KB

    • memory/1328-63-0x0000000005FF0000-0x0000000005FF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2596-53-0x0000000000B20000-0x0000000000BA0000-memory.dmp

      Filesize

      512KB

    • memory/2596-66-0x0000000000B20000-0x0000000000BA0000-memory.dmp

      Filesize

      512KB

    • memory/2596-68-0x0000000000B20000-0x0000000000BA0000-memory.dmp

      Filesize

      512KB

    • memory/2596-65-0x000007FEF5DC0000-0x000007FEF675D000-memory.dmp

      Filesize

      9.6MB

    • memory/2596-48-0x000007FEF5DC0000-0x000007FEF675D000-memory.dmp

      Filesize

      9.6MB

    • memory/2596-47-0x0000000000B20000-0x0000000000BA0000-memory.dmp

      Filesize

      512KB

    • memory/2596-46-0x000007FEF5DC0000-0x000007FEF675D000-memory.dmp

      Filesize

      9.6MB