Analysis
-
max time kernel
34s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 13:18
Behavioral task
behavioral1
Sample
CraxsRat V4.zip
Resource
win10v2004-20241007-en
General
-
Target
CraxsRat V4.zip
-
Size
145.2MB
-
MD5
b9f85a70824ca397dbfb2e954b1ddbe4
-
SHA1
da21276ef4b8f6e7e41edd786189dcc2b5299210
-
SHA256
f5526509fddb95bde20e9127e2319112966833a530bd3bb71bcb0298779609cf
-
SHA512
fb89f08923fc7a7b303c9d92403d0e22fbc92b5a87ac363628c7ea6574b8b7161aed62d04e2a0418cf4bc535602604d72e9f360c550ee273b8efeceed0327987
-
SSDEEP
3145728:XsrCnvC4sBcEdm7rYPJFPihoQPZbSVmtNyhj6NmiXQKAp91Wg5u35kH:Xf2CEdmviPiyQxbhchjmmiXoN5uJK
Malware Config
Extracted
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
Nescau71#
Signatures
-
Hawkeye family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2108-999-0x0000000000DA0000-0x0000000000DF6000-memory.dmp family_redline -
Redline family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/404-1012-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/4840-1026-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/4840-1025-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/4840-1028-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/404-1012-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/4840-1026-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/4840-1025-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/4840-1028-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/404-1012-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation CraxsRat 4.0.1.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk CraxsRat 4.0.1.exe -
Executes dropped EXE 5 IoCs
pid Process 3684 CraxsRat 4.0.1.exe 2108 build.exe 2116 CraxsRat 4.0.1.exe 3300 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" CraxsRat 4.0.1.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 whatismyipaddress.com 17 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2116 set thread context of 404 2116 CraxsRat 4.0.1.exe 93 PID 404 set thread context of 4840 404 CraxsRat 4.0.1.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CraxsRat 4.0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CraxsRat 4.0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CraxsRat 4.0.1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 CraxsRat 4.0.1.exe 2116 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe 404 CraxsRat 4.0.1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3460 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 3460 7zFM.exe Token: 35 3460 7zFM.exe Token: SeSecurityPrivilege 3460 7zFM.exe Token: SeDebugPrivilege 2116 CraxsRat 4.0.1.exe Token: SeDebugPrivilege 404 CraxsRat 4.0.1.exe Token: SeDebugPrivilege 4428 taskmgr.exe Token: SeSystemProfilePrivilege 4428 taskmgr.exe Token: SeCreateGlobalPrivilege 4428 taskmgr.exe Token: SeDebugPrivilege 548 taskmgr.exe Token: SeSystemProfilePrivilege 548 taskmgr.exe Token: SeCreateGlobalPrivilege 548 taskmgr.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3460 7zFM.exe 3460 7zFM.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 4428 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 404 CraxsRat 4.0.1.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3684 wrote to memory of 2108 3684 CraxsRat 4.0.1.exe 89 PID 3684 wrote to memory of 2108 3684 CraxsRat 4.0.1.exe 89 PID 3684 wrote to memory of 2108 3684 CraxsRat 4.0.1.exe 89 PID 3684 wrote to memory of 2116 3684 CraxsRat 4.0.1.exe 91 PID 3684 wrote to memory of 2116 3684 CraxsRat 4.0.1.exe 91 PID 3684 wrote to memory of 2116 3684 CraxsRat 4.0.1.exe 91 PID 2116 wrote to memory of 3300 2116 CraxsRat 4.0.1.exe 92 PID 2116 wrote to memory of 3300 2116 CraxsRat 4.0.1.exe 92 PID 2116 wrote to memory of 3300 2116 CraxsRat 4.0.1.exe 92 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 2116 wrote to memory of 404 2116 CraxsRat 4.0.1.exe 93 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98 PID 404 wrote to memory of 4840 404 CraxsRat 4.0.1.exe 98
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\CraxsRat V4.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3936
-
C:\Users\Admin\Desktop\CraxsRat V4\CraxsRat 4.0.1.exe"C:\Users\Admin\Desktop\CraxsRat V4\CraxsRat 4.0.1.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"3⤵
- Executes dropped EXE
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4840
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5f873bee92e6118ff16b63b2a75173818
SHA14061cab004813a12e8042b83228885dfbc88547f
SHA2567eba1b2ac702b41a3799b7c0c0a2a5a9da452e21fb847d0d8d0884f7705b5b4d
SHA512368858286de1b7a5509e3a6576f4b58919f1dbf73b97a39d1dc62faad797c15f7fbcd09cf6cc37cb138c00ecd138ae01abf93b02fa33ce86f658a2a8d213850f
-
Filesize
506KB
MD5e5fb57e8214483fd395bd431cb3d1c4b
SHA160e22fc9e0068c8156462f003760efdcac82766b
SHA256e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684
SHA512dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89
-
Filesize
4.0MB
MD5370bf5fe13aa55fc3530a608d9f563b8
SHA13fbaadea4176c8ecefab1586d18961668b1be51b
SHA256fd39d017b1dce6aa783a2507c53a170f435cb0289993115b19bdeaa192677e24
SHA512e7596e51577099411b80c7a5fa179aea96d245bd9ca058e02efad783cdb466db1a9596fc029ffd18e0a85c465070b79e8316c33f98a3eae833c806aec78412ca