Overview
overview
10Static
static
100811cf7c27...de.exe
windows7-x64
90811cf7c27...de.exe
windows10-2004-x64
90dd0b31f05...24.exe
windows7-x64
70dd0b31f05...24.exe
windows10-2004-x64
71ad888606f...e0.exe
windows7-x64
31ad888606f...e0.exe
windows10-2004-x64
31c77a07e45...95.exe
windows7-x64
101c77a07e45...95.exe
windows10-2004-x64
1023f1c183af...bc.exe
windows7-x64
1023f1c183af...bc.exe
windows10-2004-x64
1038e891599d...90.exe
windows7-x64
1038e891599d...90.exe
windows10-2004-x64
103a13e092e9...db.exe
windows7-x64
43a13e092e9...db.exe
windows10-2004-x64
43b9dabd99d...82.exe
windows7-x64
33b9dabd99d...82.exe
windows10-2004-x64
358fe9776f3...06.exe
windows7-x64
1058fe9776f3...06.exe
windows10-2004-x64
105ab93bd422...11.exe
windows7-x64
35ab93bd422...11.exe
windows10-2004-x64
36b06c25fc6...43.exe
windows7-x64
106b06c25fc6...43.exe
windows10-2004-x64
106cc8001c9b...07.exe
windows7-x64
16cc8001c9b...07.exe
windows10-2004-x64
173ca5dd6d4...3f.exe
windows7-x64
1073ca5dd6d4...3f.exe
windows10-2004-x64
107b931d48ea...f0.exe
windows7-x64
107b931d48ea...f0.exe
windows10-2004-x64
107d6892645b...0f.exe
windows7-x64
107d6892645b...0f.exe
windows10-2004-x64
109036aeb570...7e.exe
windows7-x64
39036aeb570...7e.exe
windows10-2004-x64
3Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 09:49
Behavioral task
behavioral1
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win10v2004-20241007-en
General
-
Target
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
-
Size
82KB
-
MD5
71168fd55a8d0cc983b653566d942efc
-
SHA1
732906708ad72b0f41bbe8937d2b2014758dd18a
-
SHA256
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0
-
SHA512
fe374f46eb82c7bed927b48b45896ae3a0d118171e2be248905e2e14306e0c85ae4b34521b1c0af90cb2bb6f7fe45800d289ce36b4921067aeea3e9c2a9a0842
-
SSDEEP
768:569iQap3x5Mt/+E6kmzVmh8uVHI5432rufLRoYFIk1eUwHXPmI+mL:o9m5Mt/+EtmzVs8ui+3IyRbykUHfFh
Malware Config
Extracted
crimsonrat
172.245.247.112
Signatures
-
CrimsonRAT main payload 1 IoCs
Processes:
resource yara_rule behavioral27/files/0x000500000001a4b5-28.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Executes dropped EXE 1 IoCs
Processes:
nwrtharmas.exepid Process 2720 nwrtharmas.exe -
Drops file in Program Files directory 2 IoCs
Processes:
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exedescription ioc Process File created C:\PROGRA~3\Phinvdir\nwrtharmas.exe 7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe File opened for modification C:\PROGRA~3\Phinvdir\nwrtharmas.exe 7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exedescription pid Process procid_target PID 2548 wrote to memory of 2720 2548 7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe 30 PID 2548 wrote to memory of 2720 2548 7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe 30 PID 2548 wrote to memory of 2720 2548 7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe"C:\Users\Admin\AppData\Local\Temp\7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\ProgramData\Phinvdir\nwrtharmas.exe"C:\ProgramData\Phinvdir\nwrtharmas.exe"2⤵
- Executes dropped EXE
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.6MB
MD51b6498447e05011c6909dba800800e2c
SHA1c6fe30ead8e88ad15184738b659774d39e421294
SHA25624a44d00f2eb4a33ab4eac3ee2a4e073c57a588af47055b45f26ed15fe64490e
SHA512d0437f7bca04b1bd02c542d52feb8fb3d5fa974e4f339173aa623f05f633d480acedaab20c60f776d1a1be3bc0ddb64e132378f4368d59c54fd0db0ba35f56a9
-
Filesize
56KB
MD573e27034359edc3cdbcf2fabb4bb62f7
SHA19fa67130ec555fbf65de5fd5047f9573bef0e1bf
SHA256fe2ef1da8fbcd0490601f30a0e0997ee1b42184a11f790b0f6bff6d17d8000d8
SHA5122119125ce4ec289efc4bbf667402be9d91c717308b980ab270734747e2c51663fa62416f3e6b2dacf85d53e7fe3cf8061668d66f97470651ae92b917ad1d4119