Overview
overview
10Static
static
10CraxsRat v...ny.dll
windows7-x64
1CraxsRat v...ny.dll
windows10-2004-x64
1CraxsRat v...ss.dll
windows7-x64
1CraxsRat v...ss.dll
windows10-2004-x64
1CraxsRat v...��.exe
windows7-x64
10CraxsRat v...��.exe
windows10-2004-x64
10CraxsRat v...rk.dll
windows7-x64
1CraxsRat v...rk.dll
windows10-2004-x64
1CraxsRat v...ys.dll
windows7-x64
1CraxsRat v...ys.dll
windows10-2004-x64
1CraxsRat v...PS.dll
windows7-x64
1CraxsRat v...PS.dll
windows10-2004-x64
1CraxsRat v...ms.dll
windows7-x64
1CraxsRat v...ms.dll
windows10-2004-x64
1CraxsRat v...pf.dll
windows7-x64
1CraxsRat v...pf.dll
windows10-2004-x64
1CraxsRat v...ts.dll
windows7-x64
1CraxsRat v...ts.dll
windows10-2004-x64
1CraxsRat v...io.dll
windows7-x64
1CraxsRat v...io.dll
windows10-2004-x64
1CraxsRat v...on.dll
windows7-x64
1CraxsRat v...on.dll
windows10-2004-x64
1CraxsRat v...le.dll
windows7-x64
1CraxsRat v...le.dll
windows10-2004-x64
1CraxsRat v...el.lnk
windows7-x64
3CraxsRat v...el.lnk
windows10-2004-x64
7CraxsRat v...rk.exe
windows7-x64
1CraxsRat v...rk.exe
windows10-2004-x64
1CraxsRat v...et.dll
windows7-x64
1CraxsRat v...et.dll
windows10-2004-x64
1CraxsRat v...xs.dll
windows7-x64
1CraxsRat v...xs.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 17:58
Behavioral task
behavioral1
Sample
CraxsRat v7.6/0Harmony.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CraxsRat v7.6/0Harmony.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CraxsRat v7.6/AntiBypass.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CraxsRat v7.6/AntiBypass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CraxsRat v7.6/CraxsRat v7.6.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CraxsRat v7.6/CraxsRat v7.6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CraxsRat v7.6/DrakeUI.Framework.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
CraxsRat v7.6/DrakeUI.Framework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
CraxsRat v7.6/GeoIPCitys.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
CraxsRat v7.6/GeoIPCitys.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CraxsRat v7.6/LiveCharts.MAPS.dll
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
CraxsRat v7.6/LiveCharts.MAPS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CraxsRat v7.6/LiveCharts.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
CraxsRat v7.6/LiveCharts.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
CraxsRat v7.6/LiveCharts.Wpf.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
CraxsRat v7.6/LiveCharts.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
CraxsRat v7.6/LiveCharts.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
CraxsRat v7.6/LiveCharts.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
CraxsRat v7.6/NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
CraxsRat v7.6/NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
CraxsRat v7.6/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
CraxsRat v7.6/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
CraxsRat v7.6/System.IO.Compression.ZipFile.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
CraxsRat v7.6/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
CraxsRat v7.6/Telegram Channel.lnk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
CraxsRat v7.6/Telegram Channel.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CraxsRat v7.6/VeryReal.Framework.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
CraxsRat v7.6/VeryReal.Framework.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
CraxsRat v7.6/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
CraxsRat v7.6/WinMM.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
CraxsRat v7.6/craxs.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
CraxsRat v7.6/craxs.dll
Resource
win10v2004-20241007-en
General
-
Target
CraxsRat v7.6/Telegram Channel.lnk
-
Size
1KB
-
MD5
4e0880288ad4607823df224723cd5c3c
-
SHA1
ca7a9cbbb1c5a2af44102a45c578b4e10601873e
-
SHA256
aeede2993a3dd6053b6bcb19fe3ad1fbb9b69fc54b5aef79ef58b279f558346f
-
SHA512
85d82b3be13368dd254fc967793813b4eb6c4b89bd21bebb27f68cf12d06dc1ae6335ec113650c30d8e6904f54163f7bc78746b1505b7494d9e220bd7d7e2d91
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f1d0f88842db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005552974777b7d228d10775e65b5b16863b182977b54b6d9d0bbbc50c89ecbfed000000000e8000000002000020000000f9a9aa1f558957332d3d82bfdefb1e55d9a327fea06449cc9712a75406f1b5c89000000040b49d5241212d119452a581d09203fd03152e4545331daee77a5f4a098c01de49db99dbccdf2a5deb77837bf7bf512f581b2140fa966c7499bbaf774311ca8c440654a5458f36386cb250a2dfa44a144caaf0523b4e871b755d69ee80c66ec374677c660aa61f46b3254d76e2c1d905fb98fa1d8a68409ab3f4a4fc1d2e0978a8117c82bf854f668036f6f26df0748540000000f647a05b854815b32611ec96d3829acfee2b6379a4d9cf6bb8f9c6bcf90adb65db248636010e34a6a61d77abfcf2febf49d679383b0a92a150229847c03b7e0d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000006bf5b2cbc05b44ca448dd43d4077498d350511b999a282717b7d7a74c254156e000000000e8000000002000020000000b23b502c48117f154a9b0c9bfd83d495b3d1d1b95a29821d95afced0e50f1ac520000000cc1c739a289d5332666ed8ff2b625d13793496f2aa6687ca340912fd6650c122400000004439481a4028e0c68f471ecc502c51ccc29b64d3b442a8126fa85aaac8b81123d61370d97124540bee6b9e722db779b117beb2f7331b3e6c6cbc36fd676e4d9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439065234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2260DDB1-AE7C-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2092 2492 cmd.exe 31 PID 2492 wrote to memory of 2092 2492 cmd.exe 31 PID 2492 wrote to memory of 2092 2492 cmd.exe 31 PID 2756 wrote to memory of 2808 2756 explorer.exe 33 PID 2756 wrote to memory of 2808 2756 explorer.exe 33 PID 2756 wrote to memory of 2808 2756 explorer.exe 33 PID 2808 wrote to memory of 2792 2808 iexplore.exe 34 PID 2808 wrote to memory of 2792 2808 iexplore.exe 34 PID 2808 wrote to memory of 2792 2808 iexplore.exe 34 PID 2808 wrote to memory of 2792 2808 iexplore.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CraxsRat v7.6\Telegram Channel.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" "https://t.me/ThreatCommunity"2⤵PID:2092
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/ThreatCommunity2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd48346b01363722c6103a15bac56b59
SHA16c861bc2366485ec9c2dfe20b6da17c913e15391
SHA256d410194bf5c35bbef602718ca7ba7b52835397ec05303aa23ec6bde3daadb5ef
SHA512a1b856437b417fd6e342971bf05fb70fd1499c59aa006c97655c3a83cea443c457be63a74ebeb3f63578f43d2c6f07b20c9441f555c6232e3ce1fa9cf1495c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56894f64d882144dddf14bbd21e5795c9
SHA1f4d004efcf68962af72892e95bbdfcaf105da61b
SHA2560531ff7eb402d53fffc5d5125fc266b6bba63a7e0c6ac36fb347a9c369f433f9
SHA512b71d2ec769d9f867bace84d5befebf31a01ac80450f1d94ce17cd8a9d991a048e2265dbfed137872146b8af4acc1d3a9251dff48e253e9ad310ddb8559673e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe83974e18e25b3a94e992e494af9ec
SHA1abe97be08c5ff0376bd1d18c7718b1f9ab7b6587
SHA25693dffe6c14f846448581940a14090a669e4e76fdd9cf95e2f1540c5586e40b48
SHA512e73072b7ea9ee2f9f01ce55c8c5481d26d739fdffcbc51a292323427bb2bc24fc6b6d32e25c616f74f1ce3ccb8261f19d994e3e0ddca57b0cc253671f3c2e6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c530471c19b06dbc33360b5c7f4f837
SHA1d3275e469d4e747aa3123d0c8b3d959da518e563
SHA25648830ed7694fb487f00034e23e263cf4f89b1f3d79f938696d384e2695d9ac88
SHA5121b981e5043ffc81fa026fb832b5271a883aed3fb819abffc9cc5c994fd0aa9a958e589902ce6c09fc23ddc19a6016badccae0d6bc776a397aaffa266ad8d62bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794e89733f9434c1ac85754b4a80efd0
SHA1ac132dfb543c269b2857483308e379ff7dbdf38c
SHA256d45fa47f62c0b41c6d86ae7cbf48e964b786f90bb90b1eac3c54a35097607a2e
SHA5125172c46a0b7c3b5f04e0e227e007a6ae5fc538e3d820c09a7b9414d3fc688cefae84a4a87650cadaf8fd41c19c59e79dfce63dc9c57b957e66f8dde990663dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53238a278b4f9ba03292e036d2f722a76
SHA108426d767e0ea67f8e4c91b87578bf446e405be3
SHA256aa02754eec9c26324107d59e2a2358a17634761797566bdd8c0cd3d13c6eaa95
SHA5129f225e8677692acf4575e4af2e3d6a71d502714696bf1c3facf31eccd988c3ec47ec6338a5ccceb404783dc761ce54922d2683c07a844f2431c17ba453257c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8a15acbe81ca7a4a476f16d9a19f42
SHA1e4ca02e9bde1c7696f4b6356508852ca5d921ecc
SHA256a35543d99a537f47661ff171b270683a704dea367163839b3359b30315226434
SHA51252e3530cb9dfbf684aca7ebfb5d08cf07820441f5f8cbcac46198ce67836a0cd6ca70788660163117e1db39c409c9f843317d805eff3c09e7be5b7dab6a06ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf5b4297c70e2b73560436cf58c9352
SHA146638f59db000384151a0bf68831c33fb32d2697
SHA256b6bb97c27345fa0008c96cd83e4917cad90a5c9821e88886967a0050dfede11e
SHA5120a0e779c3cd1c7c94e208d52dcdc729932e4cf5014fc636134863f694bbfb3dc045a3cb9ae0046fdd113925d8691da3f33a3caa19939cfb8a14c32258784b610
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b