Analysis

  • max time kernel
    139s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 16:31

General

  • Target

    CraxsRat V7/CraxsRat.exe.xml

  • Size

    8KB

  • MD5

    f13efc835b72885da0b75a0287818b25

  • SHA1

    03b94dc9f9e1899025da7ac81cffa68bccdfede0

  • SHA256

    32522811005521592ad64d2b2a9fcb8b2b304994f042a054f89bf13ab8399ba5

  • SHA512

    fd66007e6d7292563f70fc4812e4f27e6f029bbbf7df386dd596d7379e316592b60ff181272489488f921d575160acad97a1a417efb2a76468e34e5390c84c76

  • SSDEEP

    96:ur71H7K0rTZHyZ90nDP9SbujEBKgFAnuAnznVuupxZAEcHn4abLintYIWVv/xSpi:ur7x7vrqCC

Score
1/10

Malware Config

Signatures

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\CraxsRat V7\CraxsRat.exe.xml"
    1⤵
      PID:4888

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4888-0-0x00007FFB22410000-0x00007FFB22420000-memory.dmp

      Filesize

      64KB

    • memory/4888-1-0x00007FFB6242D000-0x00007FFB6242E000-memory.dmp

      Filesize

      4KB

    • memory/4888-2-0x00007FFB62390000-0x00007FFB62585000-memory.dmp

      Filesize

      2.0MB

    • memory/4888-3-0x00007FFB62390000-0x00007FFB62585000-memory.dmp

      Filesize

      2.0MB