Analysis

  • max time kernel
    37s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 08:36

General

  • Target

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm

  • Size

    4.6MB

  • MD5

    22ce9042f6f78202c6c346cef1b6e532

  • SHA1

    b67712125dce3f8b5d197fcc46aaf627da2fb7eb

  • SHA256

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404

  • SHA512

    0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865

  • SSDEEP

    98304:JWnSXYZsDL1nxNUQfbqKh1nshu8JOH0sLbl9t0/ZwiwrYSMlGortsUDIS7JuLYsa:0niUs39sQeK8uY+Jl9MZwdrDMlGorts2

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

162.245.191.217

Signatures

  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Users\Admin\Wrdix47\vteijam hdgtra.exe
      "C:\Users\Admin\Wrdix47\vteijam hdgtra.exe"
      2⤵
      • Executes dropped EXE
      PID:3232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\25089B5D.png

    Filesize

    1KB

    MD5

    fcf7aca9ef3ef128bae0f0a6359ced50

    SHA1

    a7c51e9af08284373644b3a93c0e4a4c659e5fc2

    SHA256

    f7af856d2330e148621403f404dd9b64abb6f242af2d00e8f4c545aaf125bfde

    SHA512

    5b888834474f77234f5689b189ac4810f0e5aaec6ed87c5e8afb37765ce4f012043d4448b0bb62c404b53d5367fbf8b92f4671dea8f4628f7c5df78694c89e80

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\7B6BF1BA.png

    Filesize

    176B

    MD5

    a9cf5a05a009c224bb6a1eae6edb2af6

    SHA1

    a20a33b3e923fe851d0bffd6bf4204267ce15614

    SHA256

    bf4f7e58f204c63c081988069d298ccbb09638d225579924c0d74731784013f7

    SHA512

    d4199e058db4393b1528106e13fbb49c5c7019302817dda9d8b1ffb9b8c67eeda41fae7cbe9e2b20f74206fce3954f86249cd88390c8295e97ae9ab99aaaeb66

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BBBB3E81.png

    Filesize

    171B

    MD5

    6e7e9038f1b6b12632cdecb3e6ed8d27

    SHA1

    2058595527b869e7e5a290fd53fd76b9ca391ebe

    SHA256

    793bddf94b4e62ad0e2fe3c24f90217da88d1786fc36cde93997e0d9c45e1cf6

    SHA512

    3313334dfd533cd5fabb0e003269a7f6e8e4787e31649516cd12d07fa40c830cf53dc06d8cf3e2850c6df2280ae54286433472e72c166a5dea437116f97de4ae

  • C:\Users\Admin\AppData\Local\Temp\TCD2D54.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    415B

    MD5

    71aa2e3eb5f9e8bed476d9f3e5fba7bc

    SHA1

    7f35a6d6df680c4024335d3e78e27a41390276b7

    SHA256

    968f405581eec0f84a85405b25ef5e6c8ece894e206d665aef18acb4e9cfb84e

    SHA512

    08ac8d340f5f1c2f1465fe08e137858c74d6f877a7aa28ce6d2ad4a9d8051613cbf47cd52898f13b97c15ce3a36ea9080bb4f70fdbdbc707614398e2b364df1c

  • C:\Users\Admin\Documents\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm.docx

    Filesize

    117KB

    MD5

    efed06b2fd437d6008a10d470e2c519f

    SHA1

    f23dc3a76b73df7e4e73c34497681805e823c09f

    SHA256

    858fa6814f8393cfaaee59ccf303cf26b18b3d7e8a2471785c733784083b602d

    SHA512

    58d6ea94cfd431c2cee2944579d0f29f14b8fd2d9cf674ac18ba3f894cfe7c34e1e8520b217194c83ec47ff295f37b4fbd479a7e81f7f3f296f60c2625dd0618

  • C:\Users\Admin\Wrdix47\domcxs.zip

    Filesize

    4.6MB

    MD5

    22ce9042f6f78202c6c346cef1b6e532

    SHA1

    b67712125dce3f8b5d197fcc46aaf627da2fb7eb

    SHA256

    e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404

    SHA512

    0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865

  • C:\Users\Admin\Wrdix47\domcxs.zip:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\Wrdix47\vteijam hdgtra.exe

    Filesize

    11.9MB

    MD5

    1d493e326d91c53e0f2f4320fb689d5f

    SHA1

    e8b470e808fab757e685ee2bf8b677cd3fd082cd

    SHA256

    a833dbdc5c2113da51bf778351834682bc6220461394050e04592cd9096e0aba

    SHA512

    9e5d16935b46caf3b729d2fd4cca25d06fbcca737016adfe57188cfa1d5ca5153ee6a81c9267e3f9ab7f377e2388c6110b8908a717462f950f77386b21dc49d7

  • C:\Users\Admin\Wrdix47\word\vteijam hdgtra.zip

    Filesize

    4.6MB

    MD5

    e31ac765d1e97698bc1efe443325e497

    SHA1

    930e2525c58d7509826be955f6d24b24370f7b25

    SHA256

    ce556d55e07bf6b57e3e086e57e9c52552ac7f00adf4a7c9f99bbc21a5ac26c2

    SHA512

    d11088e02895452a1af0df8e47449aa3150fa8c3c671bf2cd75a45c3e17ad816686dd765b7734d3310d55756ee50db3d5312e89259a10987d4bfe8354b4c98d1

  • memory/1556-10-0x00007FF93BCB0000-0x00007FF93BCC0000-memory.dmp

    Filesize

    64KB

  • memory/1556-54-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-14-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-13-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-12-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-20-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-19-0x00007FF93BCB0000-0x00007FF93BCC0000-memory.dmp

    Filesize

    64KB

  • memory/1556-22-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-21-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-18-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-17-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-16-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-15-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-6-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-11-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-1-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/1556-8-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-9-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-2-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/1556-7-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-5-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/1556-4-0x00007FF97E42D000-0x00007FF97E42E000-memory.dmp

    Filesize

    4KB

  • memory/1556-0-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/1556-3-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/1556-683-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/1556-684-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3232-446-0x000001660C700000-0x000001660D2E0000-memory.dmp

    Filesize

    11.9MB