Analysis
-
max time kernel
433s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
CraxsRat 7.6 Cracked.zip
Resource
win7-20250207-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
CraxsRat 7.6 Cracked.zip
Resource
win10v2004-20250314-en
2 signatures
150 seconds
General
-
Target
CraxsRat 7.6 Cracked.zip
-
Size
219.8MB
-
MD5
dabcc0c503312f49fa504fe727e1d049
-
SHA1
4ccab6e1e95e38c5ae360850afa909b38d3c9b75
-
SHA256
ce4eb0a5402bd23d72c73adc482f6a61d5cb6f7474f69faec1ef9206bd8f3184
-
SHA512
cdd428af219b3144624197e02d1bdeb9677d599416bc13bf537c004e6611c271b656205b471a0b4a6a7bbbddf43e6ca303983e32b5de362f8853b31d35df96fe
-
SSDEEP
6291456:3EuggS5O5U6dvxFgGGOKNZJXjGPfPz6u/Wq3ZR+18xx:JTiO5U6ZCOKHJXjG75Wq3P+18xx
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4016 7zG.exe Token: 35 4016 7zG.exe Token: SeSecurityPrivilege 4016 7zG.exe Token: SeSecurityPrivilege 4016 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4016 7zG.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\CraxsRat 7.6 Cracked.zip"1⤵PID:5808
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4680
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\CraxsRat 7.6 Cracked\" -spe -an -ai#7zMap31553:120:7zEvent283961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4016