Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    33s
  • max time network
    42s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/09/2024, 16:33 UTC

General

  • Target

    CrimsonRAT.exe

  • Size

    84KB

  • MD5

    b6e148ee1a2a3b460dd2a0adbf1dd39c

  • SHA1

    ec0efbe8fd2fa5300164e9e4eded0d40da549c60

  • SHA256

    dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba

  • SHA512

    4b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741

  • SSDEEP

    1536:IjoAILD000jsdtP66K3uch3bCuExwwSV712fRp1Oo2IeG:IqLD000wD6VRhLbzwSv2H1beG

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\ProgramData\Hdlharas\dlrarhsiva.exe
      "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
      2⤵
      • Executes dropped EXE
      PID:3432
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3524

    Network

      No results found
    • 185.136.161.124:6128
      dlrarhsiva.exe
      208 B
      4
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Hdlharas\dlrarhsiva.exe

      Filesize

      9.1MB

      MD5

      64261d5f3b07671f15b7f10f2f78da3f

      SHA1

      d4f978177394024bb4d0e5b6b972a5f72f830181

      SHA256

      87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad

      SHA512

      3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a

    • C:\ProgramData\Hdlharas\mdkhm.zip

      Filesize

      56KB

      MD5

      b635f6f767e485c7e17833411d567712

      SHA1

      5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8

      SHA256

      6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e

      SHA512

      551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af

    • memory/1072-0-0x00007FFDF6963000-0x00007FFDF6965000-memory.dmp

      Filesize

      8KB

    • memory/1072-1-0x00000213C79E0000-0x00000213C79FE000-memory.dmp

      Filesize

      120KB

    • memory/1072-2-0x00007FFDF6960000-0x00007FFDF7422000-memory.dmp

      Filesize

      10.8MB

    • memory/1072-38-0x00007FFDF6960000-0x00007FFDF7422000-memory.dmp

      Filesize

      10.8MB

    • memory/3432-34-0x00007FFDF6960000-0x00007FFDF7422000-memory.dmp

      Filesize

      10.8MB

    • memory/3432-35-0x000002BDCE170000-0x000002BDCEA84000-memory.dmp

      Filesize

      9.1MB

    • memory/3432-37-0x00007FFDF6960000-0x00007FFDF7422000-memory.dmp

      Filesize

      10.8MB

    • memory/3432-39-0x00007FFDF6960000-0x00007FFDF7422000-memory.dmp

      Filesize

      10.8MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.