Analysis

  • max time kernel
    34s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 13:18

General

  • Target

    CraxsRat V4.zip

  • Size

    145.2MB

  • MD5

    b9f85a70824ca397dbfb2e954b1ddbe4

  • SHA1

    da21276ef4b8f6e7e41edd786189dcc2b5299210

  • SHA256

    f5526509fddb95bde20e9127e2319112966833a530bd3bb71bcb0298779609cf

  • SHA512

    fb89f08923fc7a7b303c9d92403d0e22fbc92b5a87ac363628c7ea6574b8b7161aed62d04e2a0418cf4bc535602604d72e9f360c550ee273b8efeceed0327987

  • SSDEEP

    3145728:XsrCnvC4sBcEdm7rYPJFPihoQPZbSVmtNyhj6NmiXQKAp91Wg5u35kH:Xf2CEdmviPiyQxbhchjmmiXoN5uJK

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Nescau71#

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\CraxsRat V4.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3460
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3936
    • C:\Users\Admin\Desktop\CraxsRat V4\CraxsRat 4.0.1.exe
      "C:\Users\Admin\Desktop\CraxsRat V4\CraxsRat 4.0.1.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2108
      • C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe
        "C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe
          "C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"
          3⤵
          • Executes dropped EXE
          PID:3300
        • C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe
          "C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:404
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            4⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:4840
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4428
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CraxsRat 4.0.1.exe

      Filesize

      3.4MB

      MD5

      f873bee92e6118ff16b63b2a75173818

      SHA1

      4061cab004813a12e8042b83228885dfbc88547f

      SHA256

      7eba1b2ac702b41a3799b7c0c0a2a5a9da452e21fb847d0d8d0884f7705b5b4d

      SHA512

      368858286de1b7a5509e3a6576f4b58919f1dbf73b97a39d1dc62faad797c15f7fbcd09cf6cc37cb138c00ecd138ae01abf93b02fa33ce86f658a2a8d213850f

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      506KB

      MD5

      e5fb57e8214483fd395bd431cb3d1c4b

      SHA1

      60e22fc9e0068c8156462f003760efdcac82766b

      SHA256

      e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

      SHA512

      dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

    • C:\Users\Admin\Desktop\CraxsRat V4\CraxsRat 4.0.1.exe

      Filesize

      4.0MB

      MD5

      370bf5fe13aa55fc3530a608d9f563b8

      SHA1

      3fbaadea4176c8ecefab1586d18961668b1be51b

      SHA256

      fd39d017b1dce6aa783a2507c53a170f435cb0289993115b19bdeaa192677e24

      SHA512

      e7596e51577099411b80c7a5fa179aea96d245bd9ca058e02efad783cdb466db1a9596fc029ffd18e0a85c465070b79e8316c33f98a3eae833c806aec78412ca

    • memory/404-1024-0x00000000090D0000-0x00000000090D8000-memory.dmp

      Filesize

      32KB

    • memory/404-1021-0x0000000008B90000-0x0000000008BF6000-memory.dmp

      Filesize

      408KB

    • memory/404-1016-0x0000000005510000-0x00000000055A2000-memory.dmp

      Filesize

      584KB

    • memory/404-1018-0x00000000056A0000-0x00000000056F6000-memory.dmp

      Filesize

      344KB

    • memory/404-1017-0x0000000005450000-0x000000000545A000-memory.dmp

      Filesize

      40KB

    • memory/404-1012-0x0000000000400000-0x0000000000484000-memory.dmp

      Filesize

      528KB

    • memory/2108-999-0x0000000000DA0000-0x0000000000DF6000-memory.dmp

      Filesize

      344KB

    • memory/2108-1005-0x0000000005D40000-0x0000000006358000-memory.dmp

      Filesize

      6.1MB

    • memory/2108-1006-0x0000000005720000-0x0000000005732000-memory.dmp

      Filesize

      72KB

    • memory/2108-1007-0x0000000005850000-0x000000000595A000-memory.dmp

      Filesize

      1.0MB

    • memory/2108-1008-0x0000000005780000-0x00000000057BC000-memory.dmp

      Filesize

      240KB

    • memory/2108-1014-0x00000000057D0000-0x000000000581C000-memory.dmp

      Filesize

      304KB

    • memory/2116-1003-0x0000000005C50000-0x0000000005CEC000-memory.dmp

      Filesize

      624KB

    • memory/2116-1010-0x0000000006B70000-0x0000000006BAA000-memory.dmp

      Filesize

      232KB

    • memory/2116-1004-0x00000000062A0000-0x0000000006844000-memory.dmp

      Filesize

      5.6MB

    • memory/2116-998-0x0000000000F30000-0x00000000012A0000-memory.dmp

      Filesize

      3.4MB

    • memory/3684-996-0x0000000000400000-0x0000000000807000-memory.dmp

      Filesize

      4.0MB

    • memory/4840-1026-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4840-1025-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4840-1028-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4840-1027-0x0000000000420000-0x00000000004E9000-memory.dmp

      Filesize

      804KB