Analysis
-
max time kernel
1793s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 12:51
Behavioral task
behavioral1
Sample
CraxsRatV5.1.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
CraxsRatV5.1.rar
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
CraxsRatV5.1.rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
CraxsRatV5.1.rar
Resource
win11-20240426-en
General
-
Target
CraxsRatV5.1.rar
-
Size
206.5MB
-
MD5
6a1d7d68f08438a7214c630ef5cb3be7
-
SHA1
441383a718bb7124ee789fdb3e0da45d81aef26a
-
SHA256
c46240a35c5c49be634045bca8f05fe4a2ece3e7e85f5b3f35d917c3f3ebdae1
-
SHA512
6e19bfd78860f36c8c69b26126c3d750fa16a69c4aeeeac92c4f8a8016468f98874ac863c65c4cfdbc8536f4dd5c4833d5dc7535d14c75933fe508acc3911466
-
SSDEEP
3145728:Pzyjv3+0aKyZateG4MnCDNSZT25OH5kN4NQ908t24lZT25OZbU3Io8SkIS08:wO0ar32ykkRm0yP8SkIS08
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 2556 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 2556 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe 2556 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2556 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 1992 wrote to memory of 2888 1992 cmd.exe rundll32.exe PID 1992 wrote to memory of 2888 1992 cmd.exe rundll32.exe PID 1992 wrote to memory of 2888 1992 cmd.exe rundll32.exe PID 2888 wrote to memory of 2516 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2516 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2516 2888 rundll32.exe rundll32.exe PID 2516 wrote to memory of 2556 2516 rundll32.exe vlc.exe PID 2516 wrote to memory of 2556 2516 rundll32.exe vlc.exe PID 2516 wrote to memory of 2556 2516 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CraxsRatV5.1.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CraxsRatV5.1.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CraxsRatV5.1.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\CraxsRatV5.1.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
-