Resubmissions
19-07-2024 11:43
240719-nvvnlssera 1019-07-2024 11:41
240719-ntv8rasemg 419-07-2024 11:40
240719-ntaxtasekf 1019-07-2024 11:40
240719-ns1rvaygrn 119-07-2024 11:30
240719-nmj7xasbqe 10Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Cryp_RAT.rtf
Resource
win10-20240404-en
General
-
Target
Cryp_RAT.rtf
-
Size
662KB
-
MD5
1fc2941b70df9dd6cdf4cb82af740fe9
-
SHA1
e5d18e3487ca2d5037215c0e0ebfaf7ccae1c655
-
SHA256
44b87df9f68f5a3084c7d80c1c7492ca5209e816a4e83fdbd6e2fcb6f1ff936f
-
SHA512
d5da156e406093bfd398d78a36962360ed6918d6b96e641843e7eeddbd6fe41c0a1681bf0a4fe9e31be22d7b1e16267e62abafc9c14d1dea223e72f3ef810081
-
SSDEEP
12288:6NtcndUa0XzmFe4lT+F4qZDGefM4qeF4C:6Oua0XzmFFI+7Z4VT
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File created C:\Windows\rescache\_merged\2717123927\1590785016.pri WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{6A53C7EA-837A-4DF3-952B-3ED02815B016}\Client.exe:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 1396 WINWORD.EXE 1396 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid Process Token: SeTcbPrivilege 1088 svchost.exe Token: SeRestorePrivilege 1088 svchost.exe Token: SeTcbPrivilege 1088 svchost.exe Token: SeRestorePrivilege 1088 svchost.exe Token: SeTcbPrivilege 1088 svchost.exe Token: SeRestorePrivilege 1088 svchost.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
WINWORD.EXEpid Process 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE 1396 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WINWORD.EXEsvchost.exedescription pid Process procid_target PID 1396 wrote to memory of 2452 1396 WINWORD.EXE 78 PID 1396 wrote to memory of 2452 1396 WINWORD.EXE 78 PID 1088 wrote to memory of 4436 1088 svchost.exe 83 PID 1088 wrote to memory of 4436 1088 svchost.exe 83 PID 1088 wrote to memory of 5112 1088 svchost.exe 84 PID 1088 wrote to memory of 5112 1088 svchost.exe 84 PID 1088 wrote to memory of 4192 1088 svchost.exe 85 PID 1088 wrote to memory of 4192 1088 svchost.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Cryp_RAT.rtf" /o ""1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2452
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\dashost.exedashost.exe {9f1a986e-2ad7-445c-89cc285c85f6cc03}2⤵PID:4436
-
-
C:\Windows\system32\dashost.exedashost.exe {497de5c3-f29a-497c-af7bb9bd64dc6fd9}2⤵PID:5112
-
-
C:\Windows\system32\dashost.exedashost.exe {3a16de29-fad8-4d06-adc5d288e3b0c941}2⤵PID:4192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316B
MD595bb648d6eb9265eeaf0f889731b1e23
SHA1631d60a024835f4e53ceb9d0a987ce52fe517df4
SHA2569639441a9d36e7e4fda980961b75eeb334540b8cfbcee71eb3cd857e0a838e0c
SHA512184414ea68092124290049282147070a86172833359404ee26199a36083d720e291d55bb85e4ae1d02504ce841efbc646760e7cc5af4088a253aed7b2665c420
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810