Overview
overview
10Static
static
7CraxsRat Fixer.exe
windows10-2004-x64
10DefenderRemover.exe
windows10-2004-x64
1DrakeUI.Framework.dll
windows10-2004-x64
1EV.dll
windows10-2004-x64
1EV64.dll
windows10-2004-x64
1GeoIPCitys.dll
windows10-2004-x64
1HVMRun64.dll
windows10-2004-x64
1HVMRuntm.dll
windows10-2004-x64
1LiveCharts.MAPS.dll
windows10-2004-x64
1LiveCharts...ms.dll
windows10-2004-x64
1LiveCharts.Wpf.dll
windows10-2004-x64
1LiveCharts.dll
windows10-2004-x64
1NAudio.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1System.IO....le.dll
windows10-2004-x64
1WinMM.Net.dll
windows10-2004-x64
1condef/Def...gs.vbs
windows10-2004-x64
1condef/dControl.exe
windows10-2004-x64
7res/Lib/7z.dll
windows10-2004-x64
3res/Lib/7z.exe
windows10-2004-x64
1res/Lib/ApkEditor.jar
windows10-2004-x64
1res/Lib/aapt.exe
windows10-2004-x64
1res/Lib/apksigner.jar
windows10-2004-x64
1res/Lib/apktool.jar
windows10-2004-x64
1res/Lib/junk.ps1
windows10-2004-x64
1res/Lib/li...ni.dll
windows10-2004-x64
1res/Lib/li...-1.dll
windows10-2004-x64
1res/Plugin...n-2.pl
windows10-2004-x64
3res/Plugin...n-3.pl
windows10-2004-x64
3res/Plugin...n-6.pl
windows10-2004-x64
3res/Plugin...n-7.pl
windows10-2004-x64
3res/Plugin...n-8.pl
windows10-2004-x64
3Analysis
-
max time kernel
176s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 10:23
Behavioral task
behavioral1
Sample
CraxsRat Fixer.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
DefenderRemover.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
DrakeUI.Framework.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
EV.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
EV64.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
GeoIPCitys.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
HVMRun64.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
HVMRuntm.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
LiveCharts.MAPS.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
LiveCharts.WinForms.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
LiveCharts.Wpf.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
LiveCharts.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
NAudio.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
System.IO.Compression.ZipFile.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
WinMM.Net.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
condef/Defender_Settings.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
condef/dControl.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
res/Lib/7z.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
res/Lib/7z.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
res/Lib/ApkEditor.jar
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
res/Lib/aapt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
res/Lib/apksigner.jar
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
res/Lib/apktool.jar
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
res/Lib/junk.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
res/Lib/libaapt2_jni.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
res/Lib/libwinpthread-1.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
res/Plugins/Android/gen-2.pl
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
res/Plugins/Android/gen-3.pl
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
res/Plugins/Android/gen-6.pl
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
res/Plugins/Android/gen-7.pl
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
res/Plugins/Android/gen-8.pl
Resource
win10v2004-20230915-en
General
-
Target
CraxsRat Fixer.exe
-
Size
59.6MB
-
MD5
6d5ab8518cdfc5d180f20d0feeae27ed
-
SHA1
bb914d20bc4fdee6edd7cb4f67782570fd0f5f2d
-
SHA256
bfdef0348f59d57ae5c448b165ea63762049528e81134e3d6ceaac60cf910ff1
-
SHA512
41bb6ec8ad0c1b62b98eaac67b0d34789b482975d77acd2b8db86f76a4dd88317fd59cdf87403436039b0f62b4b139947c79862728494a42074299783334ce59
-
SSDEEP
1572864:FrxHmiUr0jS/dx7XKIlhKvZ3lM/D0vLGRo+aL:FJVUAYdVXTlAxVM/D0vLgmL
Malware Config
Extracted
xworm
5.0
us1.localto.net:38447
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot6580247653:AAFPWxkGtgC3Ro7400iFKADbYKphxrFz6EA/sendMessage?chat_id=1602502747
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x0007000000023495-8.dat family_xworm behavioral1/files/0x0007000000023495-14.dat family_xworm behavioral1/files/0x0007000000023495-15.dat family_xworm behavioral1/memory/2188-16-0x00000000007C0000-0x00000000007DA000-memory.dmp family_xworm behavioral1/files/0x00060000000234a8-89.dat family_xworm behavioral1/files/0x00060000000234a8-90.dat family_xworm behavioral1/files/0x00060000000234a8-95.dat family_xworm -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation CraxsRat Fixer.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2188 svchost.exe 2836 svchost.exe 2464 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3724 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2188 svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 powershell.exe 2140 powershell.exe 3172 powershell.exe 3172 powershell.exe 4040 powershell.exe 4040 powershell.exe 3244 powershell.exe 3244 powershell.exe 3244 powershell.exe 2188 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2188 svchost.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 3172 powershell.exe Token: SeDebugPrivilege 4040 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 2188 svchost.exe Token: SeDebugPrivilege 2836 svchost.exe Token: SeDebugPrivilege 2464 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2188 3452 CraxsRat Fixer.exe 89 PID 3452 wrote to memory of 2188 3452 CraxsRat Fixer.exe 89 PID 2188 wrote to memory of 2140 2188 svchost.exe 95 PID 2188 wrote to memory of 2140 2188 svchost.exe 95 PID 2188 wrote to memory of 3172 2188 svchost.exe 98 PID 2188 wrote to memory of 3172 2188 svchost.exe 98 PID 2188 wrote to memory of 4040 2188 svchost.exe 100 PID 2188 wrote to memory of 4040 2188 svchost.exe 100 PID 2188 wrote to memory of 3244 2188 svchost.exe 105 PID 2188 wrote to memory of 3244 2188 svchost.exe 105 PID 2188 wrote to memory of 3724 2188 svchost.exe 107 PID 2188 wrote to memory of 3724 2188 svchost.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CraxsRat Fixer.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat Fixer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Creates scheduled task(s)
PID:3724
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5f41f42c322498af0591f396c59dd4304
SHA1e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514
SHA256d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c
SHA5122328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f
-
Filesize
944B
MD560945d1a2e48da37d4ce8d9c56b6845a
SHA183e80a6acbeb44b68b0da00b139471f428a9d6c1
SHA256314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3
SHA5125d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8
-
Filesize
82KB
MD5a056387cda23ce0a466935f3cdbe5695
SHA1cb95d02bf8490de615f5f0b78255d4e7728eb176
SHA2569d9df2f7e710729c6c350801057d54d6ee063334c72908b29b1ef2209431c5a3
SHA512d6efadc703928ee8e043458dff58a0d0b973eefd68535a9eaa8d24c34ce3327d6aee6388bcd0411e94c41391e953bffe82990ed1bab80b0d164b0fde8ac029c8