Analysis

  • max time kernel
    763s
  • max time network
    498s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/02/2025, 14:57

General

  • Target

    Dangerous RAT/Kalogar_Online/Dell-12-30-2020/Keylog.rtf

  • Size

    418B

  • MD5

    2cb3d075e3e836741d45d2e0f5adcd93

  • SHA1

    9faaee0fb2aea0c8021b4a08d4ab9c4485001dbc

  • SHA256

    a7b6e9c3d31de8e8f22f346f9ff38f8f0a3f258a46f563ccb5f832a715bc3a26

  • SHA512

    4c81eb27a74f8576d4f11e4a9296f4d2e4760f0b8d6779d6f3978dcd2873d11f9aeed64ce2ea7fd5a97878c609b18cdcd97b8af5b9cb9f5a1d86c6f5a9d33c26

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Dangerous RAT\Kalogar_Online\Dell-12-30-2020\Keylog.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDEFB8.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    d12029b72e62a0b8f0ead1742695e225

    SHA1

    e0d95ac652ddd284cbb4c7e661be194871b05792

    SHA256

    c16fc22c51cee94750d16a198ad0a46b6a0d54c40e1a3b3994475db3d10b12e5

    SHA512

    de27806a39b6d24df1c00ee3f6a5a06f2e36cea7950604c74668dffdc6988bebedaffe2d11953a76c224e90cca0f855b71ce4d184afdcc8f343c981619159512

  • memory/2252-15-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-11-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-1-0x00007FF8D6650000-0x00007FF8D6660000-memory.dmp

    Filesize

    64KB

  • memory/2252-7-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-10-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-12-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-16-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-9-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-13-0x00007FF8D4310000-0x00007FF8D4320000-memory.dmp

    Filesize

    64KB

  • memory/2252-8-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-2-0x00007FF8D6650000-0x00007FF8D6660000-memory.dmp

    Filesize

    64KB

  • memory/2252-3-0x00007FF916663000-0x00007FF916664000-memory.dmp

    Filesize

    4KB

  • memory/2252-17-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-21-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-19-0x00007FF8D4310000-0x00007FF8D4320000-memory.dmp

    Filesize

    64KB

  • memory/2252-18-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-20-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-14-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-6-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-0-0x00007FF8D6650000-0x00007FF8D6660000-memory.dmp

    Filesize

    64KB

  • memory/2252-30-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-31-0x00007FF9165C0000-0x00007FF9167C9000-memory.dmp

    Filesize

    2.0MB

  • memory/2252-5-0x00007FF8D6650000-0x00007FF8D6660000-memory.dmp

    Filesize

    64KB

  • memory/2252-4-0x00007FF8D6650000-0x00007FF8D6660000-memory.dmp

    Filesize

    64KB