Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm
Resource
win10v2004-20240802-en
General
-
Target
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm
-
Size
4.6MB
-
MD5
22ce9042f6f78202c6c346cef1b6e532
-
SHA1
b67712125dce3f8b5d197fcc46aaf627da2fb7eb
-
SHA256
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404
-
SHA512
0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865
-
SSDEEP
98304:JWnSXYZsDL1nxNUQfbqKh1nshu8JOH0sLbl9t0/ZwiwrYSMlGortsUDIS7JuLYsa:0niUs39sQeK8uY+Jl9MZwdrDMlGorts2
Malware Config
Extracted
crimsonrat
162.245.191.217
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 3232 vteijam hdgtra.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Wrdix47\domcxs\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3232 1556 WINWORD.EXE 87 PID 1556 wrote to memory of 3232 1556 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\Wrdix47\vteijam hdgtra.exe"C:\Users\Admin\Wrdix47\vteijam hdgtra.exe"2⤵
- Executes dropped EXE
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcf7aca9ef3ef128bae0f0a6359ced50
SHA1a7c51e9af08284373644b3a93c0e4a4c659e5fc2
SHA256f7af856d2330e148621403f404dd9b64abb6f242af2d00e8f4c545aaf125bfde
SHA5125b888834474f77234f5689b189ac4810f0e5aaec6ed87c5e8afb37765ce4f012043d4448b0bb62c404b53d5367fbf8b92f4671dea8f4628f7c5df78694c89e80
-
Filesize
176B
MD5a9cf5a05a009c224bb6a1eae6edb2af6
SHA1a20a33b3e923fe851d0bffd6bf4204267ce15614
SHA256bf4f7e58f204c63c081988069d298ccbb09638d225579924c0d74731784013f7
SHA512d4199e058db4393b1528106e13fbb49c5c7019302817dda9d8b1ffb9b8c67eeda41fae7cbe9e2b20f74206fce3954f86249cd88390c8295e97ae9ab99aaaeb66
-
Filesize
171B
MD56e7e9038f1b6b12632cdecb3e6ed8d27
SHA12058595527b869e7e5a290fd53fd76b9ca391ebe
SHA256793bddf94b4e62ad0e2fe3c24f90217da88d1786fc36cde93997e0d9c45e1cf6
SHA5123313334dfd533cd5fabb0e003269a7f6e8e4787e31649516cd12d07fa40c830cf53dc06d8cf3e2850c6df2280ae54286433472e72c166a5dea437116f97de4ae
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
415B
MD571aa2e3eb5f9e8bed476d9f3e5fba7bc
SHA17f35a6d6df680c4024335d3e78e27a41390276b7
SHA256968f405581eec0f84a85405b25ef5e6c8ece894e206d665aef18acb4e9cfb84e
SHA51208ac8d340f5f1c2f1465fe08e137858c74d6f877a7aa28ce6d2ad4a9d8051613cbf47cd52898f13b97c15ce3a36ea9080bb4f70fdbdbc707614398e2b364df1c
-
Filesize
117KB
MD5efed06b2fd437d6008a10d470e2c519f
SHA1f23dc3a76b73df7e4e73c34497681805e823c09f
SHA256858fa6814f8393cfaaee59ccf303cf26b18b3d7e8a2471785c733784083b602d
SHA51258d6ea94cfd431c2cee2944579d0f29f14b8fd2d9cf674ac18ba3f894cfe7c34e1e8520b217194c83ec47ff295f37b4fbd479a7e81f7f3f296f60c2625dd0618
-
Filesize
4.6MB
MD522ce9042f6f78202c6c346cef1b6e532
SHA1b67712125dce3f8b5d197fcc46aaf627da2fb7eb
SHA256e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404
SHA5120337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
11.9MB
MD51d493e326d91c53e0f2f4320fb689d5f
SHA1e8b470e808fab757e685ee2bf8b677cd3fd082cd
SHA256a833dbdc5c2113da51bf778351834682bc6220461394050e04592cd9096e0aba
SHA5129e5d16935b46caf3b729d2fd4cca25d06fbcca737016adfe57188cfa1d5ca5153ee6a81c9267e3f9ab7f377e2388c6110b8908a717462f950f77386b21dc49d7
-
Filesize
4.6MB
MD5e31ac765d1e97698bc1efe443325e497
SHA1930e2525c58d7509826be955f6d24b24370f7b25
SHA256ce556d55e07bf6b57e3e086e57e9c52552ac7f00adf4a7c9f99bbc21a5ac26c2
SHA512d11088e02895452a1af0df8e47449aa3150fa8c3c671bf2cd75a45c3e17ad816686dd765b7734d3310d55756ee50db3d5312e89259a10987d4bfe8354b4c98d1