Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2024 03:47

General

  • Target

    5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls

  • Size

    428KB

  • MD5

    5158c5c17862225a86c8a4f36f054ae2

  • SHA1

    6da27200f473f8c55bb125f68314eecb2219c3dd

  • SHA256

    b29691ac40b8bbb12b13e84641ad20583d1387ca356850aa7b5e76b0f6c76806

  • SHA512

    c006f8ce77ef7dc150f137bb876a31e8f62f58e8337f487bab17752aa9eea95070e78b791488f36a2d152a871533a8bb9ee601f0053d1a2256d9e3cec3e7fe75

  • SSDEEP

    6144:LxEtjPOtioVjDGUU1qfDlavx+W2QnAHBM:B

Score
10/10

Malware Config

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5158c5c17862225a86c8a4f36f054ae2_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\ProgramData\Media-List\tbvrarthsa.exe
      C:\ProgramData\Media-List\tbvrarthsa.exe
      2⤵
      • Executes dropped EXE
      PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Media-List\tbvrarthsa.exe

    Filesize

    9.6MB

    MD5

    6d5e033651ae6371b8c8a44b269101b2

    SHA1

    1d069acd9f69a01a1001e3df37abb55981cf31ef

    SHA256

    9acf62d22e93d6ea68b8d04a174fcd0c4e53d0f14fe1e7fadfcef4dfcc57f480

    SHA512

    fbeef908cb2a1ad2b8d50ad41215e57afcd31707d165e4f6fa0362a8b5df67bd84eb70d98582f20d9b25cf40d26346084b647bbe56304e1631a60e76b98ff54b

  • C:\ProgramData\Media-List\tbvrarthsa.zip

    Filesize

    56KB

    MD5

    d2c407c07cb5dc103cd112804455c0de

    SHA1

    231d5808d31e04770c1850bb81df49ff877c1a2d

    SHA256

    b4412a3806d135d58b9c8ef92947369457ca9b5e492aa02cf2d7540db39dd11b

    SHA512

    76a3e86d29956c619b8ca3966c1f234bebde3e7adedbd1ad0fc4e4e32d2e7cd06c207f8680a7454102c6f478333f91a3a8ba6f203bbc31d05db7c9a3f065b0eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    4e7c14aac2d3c954fbafd722c00ceafb

    SHA1

    75fe7d6fe7b46ae0d30594943e241ea3c05c26f3

    SHA256

    b772ae57578b9b8a5d9ef975dff1a625ba54d15e39e44fc6eb8d80a0eceece5d

    SHA512

    caa9b3e92e1a27e9c06bc18fd6d6f9dff220295de394e531e4a6bdcd23f4dc7d25e0b1e08c05c73f8663656f56ef33a12be607133341c2454af25bc6a7789cc0

  • memory/1436-89-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/1436-76-0x0000000002050000-0x0000000002058000-memory.dmp

    Filesize

    32KB

  • memory/1436-75-0x000000001D140000-0x000000001D1DC000-memory.dmp

    Filesize

    624KB

  • memory/1436-73-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/1436-74-0x000000001CBD0000-0x000000001D09E000-memory.dmp

    Filesize

    4.8MB

  • memory/3996-7-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-26-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-9-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-6-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-12-0x00007FFF2AE30000-0x00007FFF2AE40000-memory.dmp

    Filesize

    64KB

  • memory/3996-13-0x00007FFF2AE30000-0x00007FFF2AE40000-memory.dmp

    Filesize

    64KB

  • memory/3996-15-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-17-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-16-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-14-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-22-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-10-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-11-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-0-0x00007FFF2D590000-0x00007FFF2D5A0000-memory.dmp

    Filesize

    64KB

  • memory/3996-8-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-5-0x00007FFF6D5AD000-0x00007FFF6D5AE000-memory.dmp

    Filesize

    4KB

  • memory/3996-4-0x00007FFF2D590000-0x00007FFF2D5A0000-memory.dmp

    Filesize

    64KB

  • memory/3996-1-0x00007FFF2D590000-0x00007FFF2D5A0000-memory.dmp

    Filesize

    64KB

  • memory/3996-77-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-2-0x00007FFF2D590000-0x00007FFF2D5A0000-memory.dmp

    Filesize

    64KB

  • memory/3996-87-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-88-0x00007FFF6D510000-0x00007FFF6D705000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-3-0x00007FFF2D590000-0x00007FFF2D5A0000-memory.dmp

    Filesize

    64KB