Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 12:30
Behavioral task
behavioral1
Sample
Craxs.exe/Built.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Craxs.exe/Built.exe
Resource
win10v2004-20241007-en
General
-
Target
Craxs.exe/Built.exe
-
Size
5.8MB
-
MD5
eafb71b1f8ff22f4b88c677c17a4159a
-
SHA1
e3fb7830e0ed8054c790679454f582248c373b51
-
SHA256
6bed48fba23d3fbb1cc02a1225abd44fa6d5d85a1f7b12768088fcfb5352ceed
-
SHA512
c530202f3393f051c11e379863a996bede0b27ae432ade1c87625d2a9b104c9cf8322d62fab64a41987c5f6f8646d1f1023b07a745ea982289df43040221882e
-
SSDEEP
98304:2nzmDSr7xRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nret+1:2nzmD6xRHvUWvozWOxu9kXwvdbDlA03n
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2544 Built.exe -
resource yara_rule behavioral1/files/0x000500000001a07e-21.dat upx behavioral1/memory/2544-23-0x000007FEF5630000-0x000007FEF5A9A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2544 2252 Built.exe 30 PID 2252 wrote to memory of 2544 2252 Built.exe 30 PID 2252 wrote to memory of 2544 2252 Built.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Craxs.exe\Built.exe"C:\Users\Admin\AppData\Local\Temp\Craxs.exe\Built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Craxs.exe\Built.exe"C:\Users\Admin\AppData\Local\Temp\Craxs.exe\Built.exe"2⤵
- Loads dropped DLL
PID:2544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c