Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:20
Static task
static1
General
-
Target
CraxsRat10.31_Cracked.exe
-
Size
86.2MB
-
MD5
39dd54c44266534e782cefcaa8ebd1fb
-
SHA1
ed8a35d1ad6bcde4853411de9fea036468dee95e
-
SHA256
8a159b0175b55083291e8356499f7efe42083863aea317f553c0779326e7a1c2
-
SHA512
5fb4d3c5623d4a5797d66983a7987c2c486878d3f8c1b6f0c15dca21d0d2fd52e20f0b0cd224b0ceb76dc797669627e60f30e8f8cee7701b9aba7ab279c617d4
-
SSDEEP
1572864:28wyR88P4amp+NX10qTQTAMzttZmFXtI:2P8Q5qUAM5HmhtI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CraxsRat10.31_Cracked.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CraxsRat10.31_Cracked.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CraxsRat10.31_Cracked.exe -
Loads dropped DLL 1 IoCs
pid Process 1856 CraxsRat10.31_Cracked.exe -
resource yara_rule behavioral1/files/0x00080000000234c5-3.dat themida behavioral1/memory/1856-8-0x0000000180000000-0x0000000181D0F000-memory.dmp themida behavioral1/memory/1856-12-0x0000000180000000-0x0000000181D0F000-memory.dmp themida behavioral1/memory/1856-11-0x0000000180000000-0x0000000181D0F000-memory.dmp themida behavioral1/memory/1856-13-0x0000000180000000-0x0000000181D0F000-memory.dmp themida behavioral1/memory/1856-15-0x0000000180000000-0x0000000181D0F000-memory.dmp themida behavioral1/memory/1856-17-0x0000000180000000-0x0000000181D0F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CraxsRat10.31_Cracked.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1856 CraxsRat10.31_Cracked.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 CraxsRat10.31_Cracked.exe 1856 CraxsRat10.31_Cracked.exe 1856 CraxsRat10.31_Cracked.exe 1856 CraxsRat10.31_Cracked.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CraxsRat10.31_Cracked.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat10.31_Cracked.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\ProtectStop.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.6MB
MD521e00d8cffdb42642b3b413540e9dd24
SHA1eae6d44c96117fcf12b4aebad2b95af76bd11f8c
SHA256611bb16bff870f5de73b83a4dc37e1dd519c4dad9ca323e5908c67516f2109b7
SHA512e938e2c94484da96ec813f401e20787e91923377be9f8217d3a9e3a4d10a36e1ec548db054c99e03abb117b2897a44556a9de4c34b57b1fd3b190a321746906f