Overview
overview
7Static
static
7AgileDotNe...me.dll
windows10-2004-x64
1ChangeLog.html
windows10-2004-x64
6CraxsRat 3.9.1.exe
windows10-2004-x64
1CraxsRat.exe.xml
windows10-2004-x64
1DrakeUI.Framework.dll
windows10-2004-x64
1GeoIPCitys.dll
windows10-2004-x64
1LiveCharts...ms.dll
windows10-2004-x64
1LiveCharts.Wpf.dll
windows10-2004-x64
1LiveCharts.dll
windows10-2004-x64
1LiveCharts...es.dll
windows10-2004-x64
3LiveChartsRegion.dll
windows10-2004-x64
3MetroSet UI.dll
windows10-2004-x64
1NAudio.dll
windows10-2004-x64
1System.IO....le.dll
windows10-2004-x64
1System.IO....on.dll
windows10-2004-x64
1Vip.Notification.dll
windows10-2004-x64
1WinMM.Net.dll
windows10-2004-x64
1Analysis
-
max time kernel
72s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 10:48
Behavioral task
behavioral1
Sample
AgileDotNet.VMRuntime.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
ChangeLog.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CraxsRat 3.9.1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
CraxsRat.exe.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
DrakeUI.Framework.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
GeoIPCitys.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
LiveCharts.WinForms.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
LiveCharts.Wpf.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LiveCharts.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
LiveChartsCountries.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
LiveChartsRegion.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
MetroSet UI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
NAudio.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
System.IO.Compression.ZipFile.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
System.IO.Compression.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
Vip.Notification.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
WinMM.Net.dll
Resource
win10v2004-20230220-en
General
-
Target
CraxsRat.exe.xml
-
Size
7KB
-
MD5
f87638ec318fabd7471dcd13057408fd
-
SHA1
d948d6ce8091f3a4e82a261be01e41146d86d09e
-
SHA256
ffce1e0cbbc9efb406b2ac43fcfdae3d6b3cf7b77195649cf416c35bddaddf3c
-
SHA512
1c674b715926bb0f645e4f2b8647dc830463f45f9f2281c6cdebf9d271a7927af52c2cf00e7259c3455fc798b95b2d05d1a034b8b862ffbed3b400562e68c525
-
SSDEEP
96:ur7V7KorTZHyZ90nDP9SbujEBKgFAnuAnznVuupxZAEcHn4abLQAntYIWVv/xWpA:ur7V79rqHm
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605b444c627bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1252838646" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051d6db365ce0f843a8e6cfaf226c4d2b0000000002000000000010660000000100002000000042241bffe5ff975d4f33a21358edabb164b90654c693fa4c34d2b4f221464ddc000000000e80000000020000200000003c6f7030e0ed119d25bf7c7e37a1162fe45d2bb2a486face39f715014426e8352000000075a68e1685cc29684d59c577f326ffee321f1a45e43425bc4c0a2a5327f0700f400000005801ea816da7134e17b63e33d8eda7e4ab40aec393482f4992140dd2f9a6ae3727bbae8ea2d3c398d3347e72a426f7863c29ab39369bebc2bf56324a09ad0fe5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "389623950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051d6db365ce0f843a8e6cfaf226c4d2b000000000200000000001066000000010000200000007551127925158d44cba72b6e23b5d05be7931378e95d39558ce12c82ba74e9be000000000e8000000002000020000000bcc6d2eb72b8979c17a7bc7f78d41f6c4884153290f7c49e132c138e5beb7c8520000000f72f74390e4670365c00164ecdeec763da7929a25eba62f0a2f5bbf6a93843da400000001090341f8fa2135b4d7a9045e64a2b9862d23d3f9889514a42592b3a8087774c8c061c3c9a65388f92a7b62342e1e4da38af1eda67ea4db2f8cd25ddc585b94b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31030114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{75BB5825-E755-11ED-8227-EAFFBFCAB687} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1252838646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31030114" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e53a4c627bd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4244 iexplore.exe 4244 iexplore.exe 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 1920 wrote to memory of 4244 1920 MSOXMLED.EXE iexplore.exe PID 1920 wrote to memory of 4244 1920 MSOXMLED.EXE iexplore.exe PID 4244 wrote to memory of 3156 4244 iexplore.exe IEXPLORE.EXE PID 4244 wrote to memory of 3156 4244 iexplore.exe IEXPLORE.EXE PID 4244 wrote to memory of 3156 4244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\CraxsRat.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CraxsRat.exe.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4244 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5cd275ffecaf5554a5a39b3e17cdb90ce
SHA12611975e733801291ecc45bedc9647dde6051748
SHA256483f01db05d75b355ce1d3d6dc32989cd0a3e6f8ad3a31853d28d898939f5f3e
SHA5120c28fc0122cf9958a626d3924a2d728afb2150548f006d6128590808054200f54657f335acde54a9a48039fa2046f207aa417ad0d45a2245c2e07b00f4f5b6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD542a2ecf84c430f67e85cbe2a9f07b80a
SHA165a5ed3e39e44fe648d848e601c46b14779c78c3
SHA256023ed644fee4fa0efb23afb28a687483fccc9c29c035e07ad902c0924ce074d9
SHA512a26c31cace6dfdbc0108b5712c165e2f24187dd39b8d4f955b136df02b6da8302530621a5be745060762a33a074478f23a454b480b0160dc630aa35dca4647f4
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee