Overview
overview
7Static
static
7CraxsRat-V...me.dll
windows10-2004-x64
1CraxsRat-V...g.html
windows10-2004-x64
1CraxsRat-V....1.exe
windows10-2004-x64
1CraxsRat-V...xe.xml
windows10-2004-x64
1CraxsRat-V...rk.dll
windows10-2004-x64
1CraxsRat-V...ys.dll
windows10-2004-x64
1CraxsRat-V...ms.dll
windows10-2004-x64
1CraxsRat-V...pf.dll
windows10-2004-x64
1CraxsRat-V...ts.dll
windows10-2004-x64
1CraxsRat-V...es.dll
windows10-2004-x64
3CraxsRat-V...on.dll
windows10-2004-x64
3CraxsRat-V...UI.dll
windows10-2004-x64
1CraxsRat-V...io.dll
windows10-2004-x64
1CraxsRat-V...le.dll
windows10-2004-x64
1CraxsRat-V...on.dll
windows10-2004-x64
1CraxsRat-V...on.dll
windows10-2004-x64
1CraxsRat-V...et.dll
windows10-2004-x64
1CraxsRat-V...-1.dex
windows10-2004-x64
3CraxsRat-V...n-2.pl
windows10-2004-x64
3CraxsRat-V...n-3.pl
windows10-2004-x64
3CraxsRat-V...-4.dex
windows10-2004-x64
3CraxsRat-V...-5.dex
windows10-2004-x64
3CraxsRat-V...n-6.pl
windows10-2004-x64
3CraxsRat-V...n-7.pl
windows10-2004-x64
3CraxsRat-V...n-8.pl
windows10-2004-x64
3Analysis
-
max time kernel
64s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 07:46
Behavioral task
behavioral1
Sample
CraxsRat-V3.9.1/AgileDotNet.VMRuntime.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
CraxsRat-V3.9.1/ChangeLog.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CraxsRat-V3.9.1/CraxsRat 3.9.1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
CraxsRat-V3.9.1/CraxsRat.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
CraxsRat-V3.9.1/DrakeUI.Framework.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
CraxsRat-V3.9.1/GeoIPCitys.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
CraxsRat-V3.9.1/LiveCharts.WinForms.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
CraxsRat-V3.9.1/LiveCharts.Wpf.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
CraxsRat-V3.9.1/LiveCharts.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
CraxsRat-V3.9.1/LiveChartsCountries.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
CraxsRat-V3.9.1/LiveChartsRegion.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral12
Sample
CraxsRat-V3.9.1/MetroSet UI.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
CraxsRat-V3.9.1/NAudio.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
CraxsRat-V3.9.1/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
CraxsRat-V3.9.1/System.IO.Compression.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
CraxsRat-V3.9.1/Vip.Notification.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
CraxsRat-V3.9.1/WinMM.Net.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-1.dex
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-3.pl
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-4.dex
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-5.dex
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
CraxsRat-V3.9.1/res/Plugins/Android/gen-8.pl
Resource
win10v2004-20230220-en
General
-
Target
CraxsRat-V3.9.1/ChangeLog.html
-
Size
1KB
-
MD5
e13a142fd65ba98dcd14acab49b75f5c
-
SHA1
5259cc36a8473edab4b5328dd45ba2c0579185cc
-
SHA256
adedda589be1f4181787e5f3453ca48f74f950ba7628099ba217d89fd9eb7f73
-
SHA512
10dfc63549eb15d2bd787f83e5da43a9a2eb34fd9fbc22d10b1015eb0869c3e323db1d49c7338a567105fea9139a04294a51a9f44e2562b703c5c10e07685004
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133274082711329404" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3984 chrome.exe 3984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3984 chrome.exe 3984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe Token: SeShutdownPrivilege 3984 chrome.exe Token: SeCreatePagefilePrivilege 3984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe 3984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3984 wrote to memory of 2196 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2196 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 2824 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 3548 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 3548 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe PID 3984 wrote to memory of 4352 3984 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\CraxsRat-V3.9.1\ChangeLog.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff968e39758,0x7ff968e39768,0x7ff968e397782⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:22⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:82⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:12⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1812,i,14621281328250510616,12001787688239104742,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50c098b268d1f62a6c008d2a32a5b0eb1
SHA1cdb43852801340797989d0416ba29b5b1194ed3f
SHA256588755c7336ddd046ba291956af684c8b61e2cff62e44244c4c0fff87759ca5f
SHA512d5d2a01a18e1775db5140a0a73911de80454c8c56c93789911f6d2783f5be30b4c76e867c8eaada1f03ed5edb19608f84483aacb2b90eeda3c9c6c20dd62c4f0
-
Filesize
149KB
MD554a7b5e715e75e5c7308d4103f59f853
SHA1287c2e1ff263d25433c5d68c45ddb59b25fb0811
SHA2560112506274dfe1cb9ebfbec6194361aecac3baaeb0cac5d5904e61ccbbe912b4
SHA51294cbaca2c3ab26fc2c2441783ac6db2aad6f2090f4d4191c32324c0ed3955c13d35eb80fddd0a8d863d5959db7d89405c1756f9f0cdc0374462c877f699cf931
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e