Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:14
Behavioral task
behavioral1
Sample
aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe
Resource
win10v2004-20241007-en
General
-
Target
aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe
-
Size
19.9MB
-
MD5
837a823641bc5ba36bc3f49f4e9e8f2d
-
SHA1
386b3cbf6be3512ee05638cf79225650dd9361a4
-
SHA256
aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c
-
SHA512
b263b861b7362e10dd1adc6c4ee7acf2adabee72d7dfb61498bf2e9e72fc5a43d25327270d247635e075eb8b592def7565b81df4c2003c6b9484dbdac065f7ab
-
SSDEEP
3072:0VIVsVWWw52dMi5snX65eHsUNBN8Jc2SUnKr9fE/C822c5:8vMrWJOBE/C8P
Malware Config
Extracted
crimsonrat
45.14.194.253
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2652 aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe 2652 aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe"C:\Users\Admin\AppData\Local\Temp\aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652