Overview
overview
7Static
static
7AgileDotNe...me.dll
windows10-2004-x64
1ChangeLog.html
windows10-2004-x64
1CraxsRat 3.9.1.exe
windows10-2004-x64
1CraxsRat.exe.xml
windows10-2004-x64
1DrakeUI.Framework.dll
windows10-2004-x64
1GeoIPCitys.dll
windows10-2004-x64
1LiveCharts...ms.dll
windows10-2004-x64
1LiveCharts.Wpf.dll
windows10-2004-x64
1LiveCharts.dll
windows10-2004-x64
1LiveCharts...es.dll
windows10-2004-x64
3LiveChartsRegion.dll
windows10-2004-x64
3MetroSet UI.dll
windows10-2004-x64
1NAudio.dll
windows10-2004-x64
1System.IO....le.dll
windows10-2004-x64
1System.IO....on.dll
windows10-2004-x64
1Vip.Notification.dll
windows10-2004-x64
1WinMM.Net.dll
windows10-2004-x64
1Analysis
-
max time kernel
61s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 03:27
Behavioral task
behavioral1
Sample
AgileDotNet.VMRuntime.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
ChangeLog.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CraxsRat 3.9.1.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
CraxsRat.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
DrakeUI.Framework.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
GeoIPCitys.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
LiveCharts.WinForms.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
LiveCharts.Wpf.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LiveCharts.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
LiveChartsCountries.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
LiveChartsRegion.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral12
Sample
MetroSet UI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
NAudio.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
System.IO.Compression.ZipFile.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
System.IO.Compression.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
Vip.Notification.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
WinMM.Net.dll
Resource
win10v2004-20230220-en
General
-
Target
ChangeLog.html
-
Size
1KB
-
MD5
e13a142fd65ba98dcd14acab49b75f5c
-
SHA1
5259cc36a8473edab4b5328dd45ba2c0579185cc
-
SHA256
adedda589be1f4181787e5f3453ca48f74f950ba7628099ba217d89fd9eb7f73
-
SHA512
10dfc63549eb15d2bd787f83e5da43a9a2eb34fd9fbc22d10b1015eb0869c3e323db1d49c7338a567105fea9139a04294a51a9f44e2562b703c5c10e07685004
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133272988947285590" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3540 wrote to memory of 384 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 384 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1396 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 2176 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 2176 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4544 3540 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ChangeLog.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85d069758,0x7ff85d069768,0x7ff85d0697782⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:22⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:12⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1856,i,1560680510731858128,2173535865286864905,131072 /prefetch:82⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5cf5382716e85b5e68feb769c4c261ca7
SHA1af1124812d64bd3f03d6a24f7b6ad38cb019f455
SHA256e6bfd659b36a81bd09afeb4d68d59e163c8921b1b2a6d4091282b7fbca927118
SHA51217011e79c998a59a3803c7c94dba74f9651f0e6b318875955eb748ed53ea1072732e3a01a5413892466a9ec40d925b182b98b04359e6348d133383e93283f8df
-
Filesize
5KB
MD5147cac85eb811609bb2037eade75c008
SHA1950be439621955cb9c83daa2370fa2945db2adf4
SHA256d7769bb35c484d11bd7fc8a10b8aa8132d8290c789c2c4edfb437f1d67b3fccf
SHA512cbb513afa411308edb7ca012f1d49bc9f015c29010c5ca5997c947762844a455017b5e19b396b913ca4db392b3af5946a3039877741f5f2f175c51aacb1ef847
-
Filesize
148KB
MD56e017b7e29086f5b5c4a8f39abd1659e
SHA124047fd39e59aa62d30914df0dace40a6a299c17
SHA2564770c7cfdfd14424dd68e4a161e889bea699d9b9747326d6b02781b45fce1f3b
SHA5127f20c59eb08a57f7ba4b94b5180cd8cc710465c7cbb70ae2a7703d9c6540516b83788863b0c17448fbc39e6afa38f28cd9746cee64fe3a6d4f104060ffd60c97
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e