Overview
overview
10Static
static
10CraxsRat V....4.exe
windows7-x64
10CraxsRat V....4.exe
windows10-2004-x64
10CraxsRat V...rk.dll
windows7-x64
1CraxsRat V...rk.dll
windows10-2004-x64
1CraxsRat V...ys.dll
windows7-x64
1CraxsRat V...ys.dll
windows10-2004-x64
1CraxsRat V...PS.dll
windows7-x64
1CraxsRat V...PS.dll
windows10-2004-x64
1CraxsRat V...ms.dll
windows7-x64
1CraxsRat V...ms.dll
windows10-2004-x64
1CraxsRat V...pf.dll
windows7-x64
1CraxsRat V...pf.dll
windows10-2004-x64
1CraxsRat V...ts.dll
windows7-x64
1CraxsRat V...ts.dll
windows10-2004-x64
1CraxsRat V...io.dll
windows7-x64
1CraxsRat V...io.dll
windows10-2004-x64
1CraxsRat V...on.dll
windows7-x64
1CraxsRat V...on.dll
windows10-2004-x64
1CraxsRat V...le.dll
windows7-x64
1CraxsRat V...le.dll
windows10-2004-x64
1CraxsRat V...et.dll
windows7-x64
1CraxsRat V...et.dll
windows10-2004-x64
1CraxsRat V...xs.dll
windows7-x64
1CraxsRat V...xs.dll
windows10-2004-x64
1CraxsRat V....4.exe
windows7-x64
3CraxsRat V....4.exe
windows10-2004-x64
1CraxsRat V...n-2.pl
windows7-x64
3CraxsRat V...n-2.pl
windows10-2004-x64
3CraxsRat V...n-6.pl
windows7-x64
3CraxsRat V...n-6.pl
windows10-2004-x64
3CraxsRat V...n-7.pl
windows7-x64
3CraxsRat V...n-7.pl
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:11
Behavioral task
behavioral1
Sample
CraxsRat V7.4/CraxsRat V7.4/CraxsRat V7.4.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
CraxsRat V7.4/CraxsRat V7.4/CraxsRat V7.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CraxsRat V7.4/CraxsRat V7.4/DrakeUI.Framework.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
CraxsRat V7.4/CraxsRat V7.4/DrakeUI.Framework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CraxsRat V7.4/CraxsRat V7.4/GeoIPCitys.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
CraxsRat V7.4/CraxsRat V7.4/GeoIPCitys.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.MAPS.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.MAPS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.WinForms.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CraxsRat V7.4/CraxsRat V7.4/LiveCharts.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
CraxsRat V7.4/CraxsRat V7.4/NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
CraxsRat V7.4/CraxsRat V7.4/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
CraxsRat V7.4/CraxsRat V7.4/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
CraxsRat V7.4/CraxsRat V7.4/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
CraxsRat V7.4/CraxsRat V7.4/System.IO.Compression.ZipFile.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
CraxsRat V7.4/CraxsRat V7.4/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
CraxsRat V7.4/CraxsRat V7.4/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
CraxsRat V7.4/CraxsRat V7.4/WinMM.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
CraxsRat V7.4/CraxsRat V7.4/craxs.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
CraxsRat V7.4/CraxsRat V7.4/craxs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
CraxsRat V7.4/CraxsRat V7.4/craxsrat v7.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
CraxsRat V7.4/CraxsRat V7.4/craxsrat v7.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-2.pl
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-6.pl
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-7.pl
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20241007-en
General
-
Target
CraxsRat V7.4/CraxsRat V7.4/res/Plugins/Android/gen-6.pl
-
Size
7KB
-
MD5
d324afb827bc0410b7387f2f22d14242
-
SHA1
bc8e494e86e41bee2ce2add6d0fe8919656a7102
-
SHA256
69572ff59d2f8b428fa2e5fad4c6abfaa78813b889740a0b17c3bf4ff522f2c7
-
SHA512
c337ade6028a734922d91e96abf87f889d57ebe825ab0a4c0d927cffb26e38558fc1c3f61ee042f423e639e60637b4b41cd436aebc054df2196868d58bcf428b
-
SSDEEP
192:2OkFCNbNbSdOYT7Ax0xrUhmE7OH7Vgpet+gfLTkRQi33o+:2pFCNIdO24gr9EiH7V03gfnkq+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 14 IoCs
Processes:
OpenWith.execmd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\.pl\ = "pl_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\뉍ٓᬀ耀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\.pl OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\뉍ٓᬀ耀\ = "pl_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\pl_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
OpenWith.exepid Process 2208 OpenWith.exe 2208 OpenWith.exe 2208 OpenWith.exe 2208 OpenWith.exe 2208 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid Process procid_target PID 2208 wrote to memory of 1688 2208 OpenWith.exe 101 PID 2208 wrote to memory of 1688 2208 OpenWith.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CraxsRat V7.4\CraxsRat V7.4\res\Plugins\Android\gen-6.pl"1⤵
- Modifies registry class
PID:3476
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\CraxsRat V7.4\CraxsRat V7.4\res\Plugins\Android\gen-6.pl2⤵PID:1688
-