Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm
Resource
win10v2004-20240802-en
General
-
Target
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm
-
Size
4.6MB
-
MD5
22ce9042f6f78202c6c346cef1b6e532
-
SHA1
b67712125dce3f8b5d197fcc46aaf627da2fb7eb
-
SHA256
e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404
-
SHA512
0337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865
-
SSDEEP
98304:JWnSXYZsDL1nxNUQfbqKh1nshu8JOH0sLbl9t0/ZwiwrYSMlGortsUDIS7JuLYsa:0niUs39sQeK8uY+Jl9MZwdrDMlGorts2
Malware Config
Extracted
crimsonrat
162.245.191.217
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
Processes:
vteijam hdgtra.exepid process 3232 vteijam hdgtra.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File created C:\Users\Admin\Wrdix47\domcxs\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
WINWORD.EXEpid process 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
WINWORD.EXEpid process 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE 1556 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1556 wrote to memory of 3232 1556 WINWORD.EXE vteijam hdgtra.exe PID 1556 wrote to memory of 3232 1556 WINWORD.EXE vteijam hdgtra.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\Wrdix47\vteijam hdgtra.exe"C:\Users\Admin\Wrdix47\vteijam hdgtra.exe"2⤵
- Executes dropped EXE
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcf7aca9ef3ef128bae0f0a6359ced50
SHA1a7c51e9af08284373644b3a93c0e4a4c659e5fc2
SHA256f7af856d2330e148621403f404dd9b64abb6f242af2d00e8f4c545aaf125bfde
SHA5125b888834474f77234f5689b189ac4810f0e5aaec6ed87c5e8afb37765ce4f012043d4448b0bb62c404b53d5367fbf8b92f4671dea8f4628f7c5df78694c89e80
-
Filesize
176B
MD5a9cf5a05a009c224bb6a1eae6edb2af6
SHA1a20a33b3e923fe851d0bffd6bf4204267ce15614
SHA256bf4f7e58f204c63c081988069d298ccbb09638d225579924c0d74731784013f7
SHA512d4199e058db4393b1528106e13fbb49c5c7019302817dda9d8b1ffb9b8c67eeda41fae7cbe9e2b20f74206fce3954f86249cd88390c8295e97ae9ab99aaaeb66
-
Filesize
171B
MD56e7e9038f1b6b12632cdecb3e6ed8d27
SHA12058595527b869e7e5a290fd53fd76b9ca391ebe
SHA256793bddf94b4e62ad0e2fe3c24f90217da88d1786fc36cde93997e0d9c45e1cf6
SHA5123313334dfd533cd5fabb0e003269a7f6e8e4787e31649516cd12d07fa40c830cf53dc06d8cf3e2850c6df2280ae54286433472e72c166a5dea437116f97de4ae
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
415B
MD571aa2e3eb5f9e8bed476d9f3e5fba7bc
SHA17f35a6d6df680c4024335d3e78e27a41390276b7
SHA256968f405581eec0f84a85405b25ef5e6c8ece894e206d665aef18acb4e9cfb84e
SHA51208ac8d340f5f1c2f1465fe08e137858c74d6f877a7aa28ce6d2ad4a9d8051613cbf47cd52898f13b97c15ce3a36ea9080bb4f70fdbdbc707614398e2b364df1c
-
Filesize
117KB
MD5efed06b2fd437d6008a10d470e2c519f
SHA1f23dc3a76b73df7e4e73c34497681805e823c09f
SHA256858fa6814f8393cfaaee59ccf303cf26b18b3d7e8a2471785c733784083b602d
SHA51258d6ea94cfd431c2cee2944579d0f29f14b8fd2d9cf674ac18ba3f894cfe7c34e1e8520b217194c83ec47ff295f37b4fbd479a7e81f7f3f296f60c2625dd0618
-
Filesize
4.6MB
MD522ce9042f6f78202c6c346cef1b6e532
SHA1b67712125dce3f8b5d197fcc46aaf627da2fb7eb
SHA256e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404
SHA5120337aefbfd63ff8081d75d552ec28cfbb4d5b710d32051dc7929796d7a24a4b19e9b17a255f7c7b1706d3c91286f19edc473b97f3fef695f2b0c0de060afb865
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
11.9MB
MD51d493e326d91c53e0f2f4320fb689d5f
SHA1e8b470e808fab757e685ee2bf8b677cd3fd082cd
SHA256a833dbdc5c2113da51bf778351834682bc6220461394050e04592cd9096e0aba
SHA5129e5d16935b46caf3b729d2fd4cca25d06fbcca737016adfe57188cfa1d5ca5153ee6a81c9267e3f9ab7f377e2388c6110b8908a717462f950f77386b21dc49d7
-
Filesize
4.6MB
MD5e31ac765d1e97698bc1efe443325e497
SHA1930e2525c58d7509826be955f6d24b24370f7b25
SHA256ce556d55e07bf6b57e3e086e57e9c52552ac7f00adf4a7c9f99bbc21a5ac26c2
SHA512d11088e02895452a1af0df8e47449aa3150fa8c3c671bf2cd75a45c3e17ad816686dd765b7734d3310d55756ee50db3d5312e89259a10987d4bfe8354b4c98d1