Resubmissions

19-07-2024 11:43

240719-nvvnlssera 10

19-07-2024 11:41

240719-ntv8rasemg 4

19-07-2024 11:40

240719-ntaxtasekf 10

19-07-2024 11:40

240719-ns1rvaygrn 1

19-07-2024 11:30

240719-nmj7xasbqe 10

Analysis

  • max time kernel
    35s
  • max time network
    37s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-07-2024 11:41

General

  • Target

    Cryp_RAT.rtf

  • Size

    662KB

  • MD5

    1fc2941b70df9dd6cdf4cb82af740fe9

  • SHA1

    e5d18e3487ca2d5037215c0e0ebfaf7ccae1c655

  • SHA256

    44b87df9f68f5a3084c7d80c1c7492ca5209e816a4e83fdbd6e2fcb6f1ff936f

  • SHA512

    d5da156e406093bfd398d78a36962360ed6918d6b96e641843e7eeddbd6fe41c0a1681bf0a4fe9e31be22d7b1e16267e62abafc9c14d1dea223e72f3ef810081

  • SSDEEP

    12288:6NtcndUa0XzmFe4lT+F4qZDGefM4qeF4C:6Oua0XzmFFI+7Z4VT

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Cryp_RAT.rtf" /o ""
    1⤵
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2452
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\system32\dashost.exe
        dashost.exe {9f1a986e-2ad7-445c-89cc285c85f6cc03}
        2⤵
          PID:4436
        • C:\Windows\system32\dashost.exe
          dashost.exe {497de5c3-f29a-497c-af7bb9bd64dc6fd9}
          2⤵
            PID:5112
          • C:\Windows\system32\dashost.exe
            dashost.exe {3a16de29-fad8-4d06-adc5d288e3b0c941}
            2⤵
              PID:4192

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\317622E6.wmf

            Filesize

            316B

            MD5

            95bb648d6eb9265eeaf0f889731b1e23

            SHA1

            631d60a024835f4e53ceb9d0a987ce52fe517df4

            SHA256

            9639441a9d36e7e4fda980961b75eeb334540b8cfbcee71eb3cd857e0a838e0c

            SHA512

            184414ea68092124290049282147070a86172833359404ee26199a36083d720e291d55bb85e4ae1d02504ce841efbc646760e7cc5af4088a253aed7b2665c420

          • C:\Users\Admin\AppData\Local\Temp\TCDABE6.tmp\gb.xsl

            Filesize

            262KB

            MD5

            51d32ee5bc7ab811041f799652d26e04

            SHA1

            412193006aa3ef19e0a57e16acf86b830993024a

            SHA256

            6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

            SHA512

            5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

          • memory/1396-16-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-12-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-4-0x00007FF8AEF65000-0x00007FF8AEF66000-memory.dmp

            Filesize

            4KB

          • memory/1396-20-0x00007FF86B690000-0x00007FF86B6A0000-memory.dmp

            Filesize

            64KB

          • memory/1396-8-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-10-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-9-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-25-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-11-0x00007FF86B690000-0x00007FF86B6A0000-memory.dmp

            Filesize

            64KB

          • memory/1396-13-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-14-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-15-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-17-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-27-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-0-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-19-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-5-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-3-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-18-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-30-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-32-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-31-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-29-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-28-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-26-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-1-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-2-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-736-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB

          • memory/1396-815-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-818-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-817-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-816-0x00007FF86EF50000-0x00007FF86EF60000-memory.dmp

            Filesize

            64KB

          • memory/1396-819-0x00007FF8AEEC0000-0x00007FF8AF09B000-memory.dmp

            Filesize

            1.9MB