Analysis

  • max time kernel
    605s
  • max time network
    876s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2023 20:30

General

  • Target

    CraxsRat.xml

  • Size

    16KB

  • MD5

    4ff73212d7d2187a4f22750eed7c87b9

  • SHA1

    5a89a5e44616189fab928138567d6fb0f2797e75

  • SHA256

    3158967b27592b793dc731382decb92da050097eb8528d654e7e9737cdf04c4b

  • SHA512

    d6f011b5eb0b2629fc90173a23e5f36d65c865e0ebccc98609348bdf5233e1e84ad873b0a6b95c0c41e3d8905f4118b431db31716fc82564a377eb157d293ca4

  • SSDEEP

    384:3xIfunXQgZ0DaUmhgbkxWPV4OzT8qKSODeSjD7BTPM0:IunXt0D+nDl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\CraxsRat.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CraxsRat.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4224 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4252

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    37c79f76883dd7f46fb18326bbc6ae91

    SHA1

    e497f7d518a547dadd6b87db925199d2bc2028bb

    SHA256

    81d26deef623c5fdacc7c28350ebe71621f0625d70b54bc95775fa50c8ddb3f2

    SHA512

    1f002f0b666a353788c7dae6eea63a33191f7fceea215570b9a6d39f80784fd0f6fa64abc5e01a41a563828176d0004f0f4044f7836db7bdc1aa8972f8c7deb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    3fe4cac4ffa34a767c8e9c2a0d6f99ab

    SHA1

    f6ecf81c2124f10997cde4d522fefb1bee84b85c

    SHA256

    63eb6c56576a79cc4b9b059ac014dab6cfe55ce1b0afc5282c24034ba190b889

    SHA512

    004ac1a8b3db151c45fcfc65cb1604475477b797b8572fe93aa8c4d5b345f09d339326003f75a9c73fb266db9d145c0c4e5513efb34df7cb316b0b0915dcec0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\480JMPRZ\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1BMIUHY6.cookie
    Filesize

    244B

    MD5

    2750c5d5a88e4a8c9b6e69cc8b06b866

    SHA1

    631e87c5b08cea6b2e17af2715b222f4077a9adf

    SHA256

    57ad5b5aa5e50b4ed3fb2ccf624b15ab3d46d892f61c05d7837554adc403b088

    SHA512

    0e23d613eec0dddc19782a3a3d2b71acb0a5b19c044a515daee132b3922847e5c47d428b5243165298bbca4900b416d6a2b528be897b3e096e0c9b508b2318e0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EYM9MS1W.cookie
    Filesize

    615B

    MD5

    455582caa8f740983eab90779365d7db

    SHA1

    6dcf8f12297fe401102006e61e7dd0e2d263197e

    SHA256

    75b76d5fb488b05ca8af81d1537160a330c240d19e39bdcab73220b205c1a94b

    SHA512

    816ead2b5bf0f4ea6f02f82537592e9ca0c25eabbe57528bc4ecd7be65ebb60a83973a56df78840af0368abee809724bce63151571036a5e9fe470dda400ed77

  • memory/3752-124-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-126-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-127-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-128-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-125-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-121-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-123-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB

  • memory/3752-122-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp
    Filesize

    64KB