Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 03:47

General

  • Target

    5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls

  • Size

    428KB

  • MD5

    5158c5c17862225a86c8a4f36f054ae2

  • SHA1

    6da27200f473f8c55bb125f68314eecb2219c3dd

  • SHA256

    b29691ac40b8bbb12b13e84641ad20583d1387ca356850aa7b5e76b0f6c76806

  • SHA512

    c006f8ce77ef7dc150f137bb876a31e8f62f58e8337f487bab17752aa9eea95070e78b791488f36a2d152a871533a8bb9ee601f0053d1a2256d9e3cec3e7fe75

  • SSDEEP

    6144:LxEtjPOtioVjDGUU1qfDlavx+W2QnAHBM:B

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

142.234.201.80

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\ProgramData\Media-List\tbvrarthsa.exe
      C:\ProgramData\Media-List\tbvrarthsa.exe
      2⤵
      • Executes dropped EXE
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\MEDIA-~1\TBVRAR~1.ZIP

    Filesize

    56KB

    MD5

    d2c407c07cb5dc103cd112804455c0de

    SHA1

    231d5808d31e04770c1850bb81df49ff877c1a2d

    SHA256

    b4412a3806d135d58b9c8ef92947369457ca9b5e492aa02cf2d7540db39dd11b

    SHA512

    76a3e86d29956c619b8ca3966c1f234bebde3e7adedbd1ad0fc4e4e32d2e7cd06c207f8680a7454102c6f478333f91a3a8ba6f203bbc31d05db7c9a3f065b0eb

  • \ProgramData\Media-List\tbvrarthsa.exe

    Filesize

    9.6MB

    MD5

    6d5e033651ae6371b8c8a44b269101b2

    SHA1

    1d069acd9f69a01a1001e3df37abb55981cf31ef

    SHA256

    9acf62d22e93d6ea68b8d04a174fcd0c4e53d0f14fe1e7fadfcef4dfcc57f480

    SHA512

    fbeef908cb2a1ad2b8d50ad41215e57afcd31707d165e4f6fa0362a8b5df67bd84eb70d98582f20d9b25cf40d26346084b647bbe56304e1631a60e76b98ff54b

  • memory/2056-55-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-47-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-48-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-46-0x000007FEF59DE000-0x000007FEF59DF000-memory.dmp

    Filesize

    4KB

  • memory/2376-7-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-9-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-19-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-17-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-23-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-11-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-10-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-6-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-8-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2376-5-0x00000000067D0000-0x00000000068D0000-memory.dmp

    Filesize

    1024KB

  • memory/2376-4-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-3-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-54-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2376-53-0x000000007333D000-0x0000000073348000-memory.dmp

    Filesize

    44KB

  • memory/2376-1-0x000000007333D000-0x0000000073348000-memory.dmp

    Filesize

    44KB