Overview
overview
10Static
static
10CraxsRat V....4.exe
windows7-x64
10CraxsRat V....4.exe
windows10-2004-x64
10CraxsRat V...rk.dll
windows7-x64
1CraxsRat V...rk.dll
windows10-2004-x64
1CraxsRat V...ys.dll
windows7-x64
1CraxsRat V...ys.dll
windows10-2004-x64
1CraxsRat V...PS.dll
windows7-x64
1CraxsRat V...PS.dll
windows10-2004-x64
1CraxsRat V...ms.dll
windows7-x64
1CraxsRat V...ms.dll
windows10-2004-x64
1CraxsRat V...pf.dll
windows7-x64
1CraxsRat V...pf.dll
windows10-2004-x64
1CraxsRat V...ts.dll
windows7-x64
1CraxsRat V...ts.dll
windows10-2004-x64
1CraxsRat V...io.dll
windows7-x64
1CraxsRat V...io.dll
windows10-2004-x64
1CraxsRat V...on.dll
windows7-x64
1CraxsRat V...on.dll
windows10-2004-x64
1CraxsRat V...le.dll
windows7-x64
1CraxsRat V...le.dll
windows10-2004-x64
1CraxsRat V...et.dll
windows7-x64
1CraxsRat V...et.dll
windows10-2004-x64
1CraxsRat V...xs.dll
windows7-x64
1CraxsRat V...xs.dll
windows10-2004-x64
1CraxsRat V....4.exe
windows7-x64
3CraxsRat V....4.exe
windows10-2004-x64
1CraxsRat V...n-2.pl
windows7-x64
3CraxsRat V...n-2.pl
windows10-2004-x64
3CraxsRat V...n-6.pl
windows7-x64
3CraxsRat V...n-6.pl
windows10-2004-x64
3CraxsRat V...n-7.pl
windows7-x64
3CraxsRat V...n-7.pl
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:11
Behavioral task
behavioral1
Sample
CraxsRat V7.4/CraxsRat V7.4/CraxsRat V7.4.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
CraxsRat V7.4/CraxsRat V7.4/CraxsRat V7.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CraxsRat V7.4/CraxsRat V7.4/DrakeUI.Framework.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
CraxsRat V7.4/CraxsRat V7.4/DrakeUI.Framework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CraxsRat V7.4/CraxsRat V7.4/GeoIPCitys.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
CraxsRat V7.4/CraxsRat V7.4/GeoIPCitys.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.MAPS.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.MAPS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.WinForms.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
CraxsRat V7.4/CraxsRat V7.4/NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
CraxsRat V7.4/CraxsRat V7.4/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
CraxsRat V7.4/CraxsRat V7.4/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
CraxsRat V7.4/CraxsRat V7.4/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
CraxsRat V7.4/CraxsRat V7.4/System.IO.Compression.ZipFile.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
CraxsRat V7.4/CraxsRat V7.4/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
CraxsRat V7.4/CraxsRat V7.4/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
CraxsRat V7.4/CraxsRat V7.4/WinMM.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
CraxsRat V7.4/CraxsRat V7.4/craxs.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
CraxsRat V7.4/CraxsRat V7.4/craxs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
CraxsRat V7.4/CraxsRat V7.4/craxsrat v7.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
CraxsRat V7.4/CraxsRat V7.4/craxsrat v7.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-2.pl
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-6.pl
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-7.pl
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20241007-en
General
-
Target
CraxsRat V7.4/CraxsRat V7.4/CraxsRat V7.4.exe
-
Size
62.2MB
-
MD5
64c02477cd6d67ced767aa342b8f61c0
-
SHA1
6b488e3b0185e30721cfc49e33a2a98864464f8e
-
SHA256
0530181f39d786218085f317b23fc38c271c6b99bf063662c46948214a988eaa
-
SHA512
120da180771db3b685fa96cc648b74fbb51da37f004d754fd5470a6b1e46a67151fcdfc1e520d1057398f5315e4ceca8c75dfb6ea3e36cb55d3c775e18603346
-
SSDEEP
786432:cc+NX10EPRuHoA5AKF7zR/t6tKF+iS6JkKgApbLKo2R:D+NX10qwAMzttZm6CKXxIR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
craxsrat v7.4.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid Process 1804 craxsrat v7.4.exe 320 icsys.icn.exe 620 explorer.exe 940 spoolsv.exe 3060 svchost.exe 2868 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
spoolsv.exeexplorer.exeCraxsRat V7.4.exeicsys.icn.exedescription ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe CraxsRat V7.4.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeCraxsRat V7.4.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CraxsRat V7.4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CraxsRat V7.4.exeicsys.icn.exepid Process 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe 320 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid Process 620 explorer.exe 3060 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
craxsrat v7.4.exepid Process 1804 craxsrat v7.4.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
craxsrat v7.4.exepid Process 1804 craxsrat v7.4.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
CraxsRat V7.4.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid Process 2660 CraxsRat V7.4.exe 2660 CraxsRat V7.4.exe 320 icsys.icn.exe 320 icsys.icn.exe 620 explorer.exe 620 explorer.exe 940 spoolsv.exe 940 spoolsv.exe 3060 svchost.exe 3060 svchost.exe 2868 spoolsv.exe 2868 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
CraxsRat V7.4.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid Process procid_target PID 2660 wrote to memory of 1804 2660 CraxsRat V7.4.exe 87 PID 2660 wrote to memory of 1804 2660 CraxsRat V7.4.exe 87 PID 2660 wrote to memory of 320 2660 CraxsRat V7.4.exe 94 PID 2660 wrote to memory of 320 2660 CraxsRat V7.4.exe 94 PID 2660 wrote to memory of 320 2660 CraxsRat V7.4.exe 94 PID 320 wrote to memory of 620 320 icsys.icn.exe 95 PID 320 wrote to memory of 620 320 icsys.icn.exe 95 PID 320 wrote to memory of 620 320 icsys.icn.exe 95 PID 620 wrote to memory of 940 620 explorer.exe 96 PID 620 wrote to memory of 940 620 explorer.exe 96 PID 620 wrote to memory of 940 620 explorer.exe 96 PID 940 wrote to memory of 3060 940 spoolsv.exe 97 PID 940 wrote to memory of 3060 940 spoolsv.exe 97 PID 940 wrote to memory of 3060 940 spoolsv.exe 97 PID 3060 wrote to memory of 2868 3060 svchost.exe 98 PID 3060 wrote to memory of 2868 3060 svchost.exe 98 PID 3060 wrote to memory of 2868 3060 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\CraxsRat V7.4\CraxsRat V7.4\CraxsRat V7.4.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat V7.4\CraxsRat V7.4\CraxsRat V7.4.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\users\admin\appdata\local\temp\craxsrat v7.4\craxsrat v7.4\craxsrat v7.4.exe"c:\users\admin\appdata\local\temp\craxsrat v7.4\craxsrat v7.4\craxsrat v7.4.exe "2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1804
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5a6c50b967b24ac189b14067a4ef27daf
SHA13f7733b27832f1ef70992fb93469a76638c123ea
SHA256975099d8efea84173e6cbd4693feea5fdba522949baf60b03d58b05a40061d01
SHA5122830a14befc6bd32bab8c93b4dd423666449eb06f40e2ef4ee0af6da8d9b525930ecbf412c8293615ba5b1055088a880100e03c3a0878b3757d8c3c022beca5d
-
Filesize
135KB
MD58af16e9175bb5820581bd95e3bf730aa
SHA12a0763e42e32d172dff2bf79b7dfeaf911f69fad
SHA2561281996ce238f20d10d44d0dbf840c9c77249f6b81607629b98afa1dc96dc0b4
SHA512a6dbf94688da4fe1833c6d6cd5100b50b673dbb6e09abe8bead5572916e3dbb8f72fc68b656ac7e029e7b66bc8f6e3a20e509cbd7328c094492260e2bd204937
-
Filesize
135KB
MD592b630b323a21253264d9b0d8b067d08
SHA1560e6e43c7956dbe1a24d7a9273c374ba35248e2
SHA2565c57c434feb036ea6a2c79995efa8bb8b6021f54c9929e9a6dca65f8cb4452f5
SHA5128b646fa450cc511cdf542068832a01234eae897f7c9efe5488cca94cb94165f2cc82802d78fa30854935bde2b094443695ca615909755e5d3310c3e02fa7d386
-
Filesize
135KB
MD511eecd1be349d412de7f35a68c16a192
SHA1bddc43e254db10d548f8b50564352acd244bd72d
SHA256be39e7748d7b1647f68a7a5c3381c09c46ce4360c56e492254fea5d4734b979c
SHA5129a400880d2797bfd87deeb233a8596f3a307877bad16a34427d93f449a0f5fee034bcac4bc18d5a7817ec9465a1d555061b59ea1b7e0bdf4a9bb1a865b479183