Overview
overview
10Static
static
10CraxsRat 7.4 vip.rar
windows10-2004-x64
3CraxsRat 7...7z.exe
windows10-2004-x64
3CraxsRat 7...pt.exe
windows10-2004-x64
3CraxsRat 7...g.html
windows10-2004-x64
8CraxsRat 7...at.exe
windows10-2004-x64
10CraxsRat 7...rk.dll
windows10-2004-x64
8CraxsRat 7...ys.dll
windows10-2004-x64
8CraxsRat 7...64.dll
windows10-2004-x64
8CraxsRat 7...tm.dll
windows10-2004-x64
3CraxsRat 7...PS.dll
windows10-2004-x64
3CraxsRat 7...ms.dll
windows10-2004-x64
3CraxsRat 7...pf.dll
windows10-2004-x64
8CraxsRat 7...ts.dll
windows10-2004-x64
3CraxsRat 7...io.dll
windows10-2004-x64
3CraxsRat 7...on.dll
windows10-2004-x64
3CraxsRat 7...le.dll
windows10-2004-x64
3CraxsRat 7...et.dll
windows10-2004-x64
3CraxsRat 7...xs.dll
windows10-2004-x64
8CraxsRat 7...7z.dll
windows10-2004-x64
3CraxsRat 7...7z.exe
windows10-2004-x64
10CraxsRat 7...or.jar
windows10-2004-x64
3CraxsRat 7...pt.exe
windows10-2004-x64
10CraxsRat 7...er.jar
windows10-2004-x64
3CraxsRat 7...ol.jar
windows10-2004-x64
3CraxsRat 7...nk.ps1
windows10-2004-x64
3CraxsRat 7...ni.dll
windows10-2004-x64
3CraxsRat 7...-1.dll
windows10-2004-x64
6CraxsRat 7...n-2.pl
windows10-2004-x64
8CraxsRat 7...n-3.pl
windows10-2004-x64
8CraxsRat 7...n-6.pl
windows10-2004-x64
8CraxsRat 7...n-7.pl
windows10-2004-x64
8CraxsRat 7...n-8.pl
windows10-2004-x64
8Analysis
-
max time kernel
526s -
max time network
544s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 17:36
Behavioral task
behavioral1
Sample
CraxsRat 7.4 vip.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral2
Sample
CraxsRat 7.4 vip/._cache_7z.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
CraxsRat 7.4 vip/._cache_aapt.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral4
Sample
CraxsRat 7.4 vip/ChangeLog.html
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
CraxsRat 7.4 vip/CraxsRat.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral6
Sample
CraxsRat 7.4 vip/DrakeUI.Framework.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
CraxsRat 7.4 vip/GeoIPCitys.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral8
Sample
CraxsRat 7.4 vip/HVMRun64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
CraxsRat 7.4 vip/HVMRuntm.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral10
Sample
CraxsRat 7.4 vip/LiveCharts.MAPS.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
CraxsRat 7.4 vip/LiveCharts.WinForms.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral12
Sample
CraxsRat 7.4 vip/LiveCharts.Wpf.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
CraxsRat 7.4 vip/LiveCharts.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral14
Sample
CraxsRat 7.4 vip/NAudio.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
CraxsRat 7.4 vip/Newtonsoft.Json.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral16
Sample
CraxsRat 7.4 vip/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
CraxsRat 7.4 vip/WinMM.Net.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral18
Sample
CraxsRat 7.4 vip/craxs.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
CraxsRat 7.4 vip/res/Lib/7z.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral20
Sample
CraxsRat 7.4 vip/res/Lib/7z.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral21
Sample
CraxsRat 7.4 vip/res/Lib/ApkEditor.jar
Resource
win10v2004-20250211-en
Behavioral task
behavioral22
Sample
CraxsRat 7.4 vip/res/Lib/aapt.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
CraxsRat 7.4 vip/res/Lib/apksigner.jar
Resource
win10v2004-20250207-en
Behavioral task
behavioral24
Sample
CraxsRat 7.4 vip/res/Lib/apktool.jar
Resource
win10v2004-20250211-en
Behavioral task
behavioral25
Sample
CraxsRat 7.4 vip/res/Lib/junk.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral26
Sample
CraxsRat 7.4 vip/res/Lib/libaapt2_jni.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral27
Sample
CraxsRat 7.4 vip/res/Lib/libwinpthread-1.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral28
Sample
CraxsRat 7.4 vip/res/Plugins/Android/gen-2.pl
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
CraxsRat 7.4 vip/res/Plugins/Android/gen-3.pl
Resource
win10v2004-20250207-en
Behavioral task
behavioral30
Sample
CraxsRat 7.4 vip/res/Plugins/Android/gen-6.pl
Resource
win10v2004-20250207-en
Behavioral task
behavioral31
Sample
CraxsRat 7.4 vip/res/Plugins/Android/gen-7.pl
Resource
win10v2004-20250211-en
Behavioral task
behavioral32
Sample
CraxsRat 7.4 vip/res/Plugins/Android/gen-8.pl
Resource
win10v2004-20250211-en
General
-
Target
CraxsRat 7.4 vip/HVMRuntm.dll
-
Size
1.8MB
-
MD5
9021bc4fd9cc7752687ea1516e8a2294
-
SHA1
cc169f76ed62e9377130500553d9391a4fa16e9e
-
SHA256
8c15355190608d6f3e08efab275faca80f34683d489bb382efac8c02797bfaa1
-
SHA512
e853def48945ad6ba310015010e89cc4058469a3a2e7d5b2b8d438aead520393f0a34d12510fa9e5f2b0d0ec0465da5186eac6c4a6d3df34b0caf1ac594919a8
-
SSDEEP
49152:HGrO4YmI6VdhlItpy213BMps1vKKo5g5n8qwS32:HGZY36V/6niEiTqn8H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4428 MicrosoftEdgeUpdate.exe 972 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3088 1852 rundll32.exe 86 PID 1852 wrote to memory of 3088 1852 rundll32.exe 86 PID 1852 wrote to memory of 3088 1852 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\CraxsRat 7.4 vip\HVMRuntm.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\CraxsRat 7.4 vip\HVMRuntm.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzY1OTU0NTUzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4428
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjRCNDlEQkYtNEMxNC00RkU0LUEwNUQtRDU3RTU4RUU3NzhFfSIgdXNlcmlkPSJ7MDM5MkMzMjEtRDQzRi00MTBGLUJBNUYtM0VCQjBDMTU1MzZGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5OURGM0IwNi05MEVGLTRBMzQtODk2Ri1DNDk5QTNBM0FDQjJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS40MyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjYiIGNvaG9ydD0icnJmQDAuMDMiPjx1cGRhdGVjaGVjay8-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSI2IiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9Ins1RkUzRjIxRC01OUNGLTRGN0YtODAxMi05OTg3QjMzNjk0QzZ9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD5438fbc8221d661905c0590a253885a66
SHA1849eec932b1371fbe7b6308db36d2fc474235ad7
SHA2565ec76e30e7812361d8641356f70fd5fa11cece1f1a00264b64d06853a4e0c138
SHA512f36572b23a2df10fbfa008351d26e9e47582f3e9ebd4ef516ba10f432181166492caf120f1ea76d8e6a4157bfc0c9eda6458d7df630ff51dea540f0395543e1d