Edit tour

Windows Analysis Report
CraxsRat.exe

Overview

General Information

Sample name:CraxsRat.exe
Analysis ID:1503875
MD5:a49c1840f7d6cdb3365048a571e98da0
SHA1:0f40e60972bceaa21d3d176a40719b32adedc499
SHA256:229238e78dc4155bfa95ee149819801a293ae635775776cbb2cbc371e9e9b0af
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • CraxsRat.exe (PID: 7496 cmdline: "C:\Users\user\Desktop\CraxsRat.exe" MD5: A49C1840F7D6CDB3365048A571E98DA0)
    • WerFault.exe (PID: 7648 cmdline: C:\Windows\system32\WerFault.exe -u -p 7496 -s 800 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: CraxsRat.exeAvira: detected
Source: CraxsRat.exeReversingLabs: Detection: 36%
Source: CraxsRat.exeVirustotal: Detection: 43%Perma Link
Source: CraxsRat.exeJoe Sandbox ML: detected
Source: CraxsRat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: \??\C:\Users\user\Desktop\CraxsRat.PDBC source: CraxsRat.exe, 00000000.00000002.2173046196.000001B5C34E5000.00000004.00000020.00020000.00000000.sdmp
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0L
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.mapbox.com/styles/v1/
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.css
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.js
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://maps.googleapis.com/maps/api/staticmap?center=%.6f
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\CraxsRat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7496 -s 800
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\CraxsRat.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7496
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\365869e0-fbba-48b3-864c-11311b547948Jump to behavior
Source: CraxsRat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: CraxsRat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\CraxsRat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: CraxsRat.exeReversingLabs: Detection: 36%
Source: CraxsRat.exeVirustotal: Detection: 43%
Source: C:\Users\user\Desktop\CraxsRat.exeFile read: C:\Users\user\Desktop\CraxsRat.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\CraxsRat.exe "C:\Users\user\Desktop\CraxsRat.exe"
Source: C:\Users\user\Desktop\CraxsRat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7496 -s 800
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: CraxsRat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: CraxsRat.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: CraxsRat.exeStatic file information: File size 66290688 > 1048576
Source: CraxsRat.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3f33c00
Source: CraxsRat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8D1B.tmp.dmp.3.dr
Source: Binary string: \??\C:\Users\user\Desktop\CraxsRat.PDBC source: CraxsRat.exe, 00000000.00000002.2173046196.000001B5C34E5000.00000004.00000020.00020000.00000000.sdmp
Source: CraxsRat.exeStatic PE information: 0xC1F3C3A4 [Fri Feb 10 18:47:00 2073 UTC]
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeMemory allocated: 1B5C3660000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeMemory allocated: 1B5DCEE0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: cS3lrib01CFAIQ9f8ydPh0fdi9YJUJqlmStvhGfSa+5uoym0kYzcoiuuIn4DMKfclqys3eCi6u19
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: fOXE8j+7bgE0ekcHQ5cZADYm2MD9RlUHXrGi6x7jDbF6OLBSOkMGN9vQfQBF9XlvmcIbE3AUPzOx
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: x+BJTVORr1fKhgfs9Al7TKsy4+THJ1XN8HM9fqTBSeqDyjr7L0PMUMW/FlLnf6n9FUlWegMlykqR
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: phcf8h2bWFXoSPuWTTIvvf1suzgG4pYL9TP6qeLvfCeZgRU4dN3a//0WbFRdbyNP51nHgfs5mp4s
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: VujE0j8gHiffU5gZFvFO5lENanqWerszNYlvmV0zVmgg6UlUf8QTHgfSZvI4ST1qVN4JEXaDEL4L
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LRI6nD99xi+Wu0fMarE2q8+wl4AL7aRccWYuvId5p7Sv1TMEkVthgFS1kkr65UGcvJTCg7EXm5W+
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: orGZS/ElwmQgWtsE4+g7aNV9LPOJ7GB5nAT8FOHgFSFlQVGL+o4meGHNgBvAuO6za7bux5bHCqJ5
Source: CraxsRat.exeBinary or memory string: Xd7tzkf+YnhJ41oCfrvmCIddPnBdH2cln/54W/tFdOkVD53hJX6r/Ax9UM5zBiCcu924bPnuarlS
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: HAxdT8A0DHihW1CfT909Vugky1knpRlFS6fHMeWDQ++9nxf5UCBIlQX/MGDrMUmBsbTuSCwQJbcF
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Mz7AgPEJVab3T3wggQAVu5OwdqLHHV5EEve6Wm8GS5NlVjkHmQDkDLfVpKZq53HgfsXtKBaH+QZA
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: w0lyngvPP2yWdkRpvmCIFWo0WZB40kEMYz8/8fJK4M9AKWzMwH48gsjFEfXI8PHsltUTHOrk25o1
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: exSU40Pq+ak9IUWnDdd+8exJK/EoPlm4WiDYhNIB+WJUdafUGpg/WaBQEmUW8DJ4lCkzwMhDWPlO
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 404MYBcp7Wyfz9MxMmbz3B9ix6xt08vmcI+Af4Gl6aZKnfO1qaD2wtU6/ICqXbKnHNA7DFKvAj0R
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: bcuYPNIdayzcwIFv5DWKZhJfVOYk8DxHRwJS2SosJlKBX4G6o5B1s7oKkrqEmutFBIwJJHDSZhUm
Source: CraxsRat.exeBinary or memory string: TdUKaODJ1W3cbI+ZdpMALtVmCiizTDCMboQagdGfr3mX7I11xyBfpYT2jto3BnpENzIQOolaScjK
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: tYcWIjYXY0HJ4ki46tgcKizCwIdU4ULjQXRO9d3I86dvmCiqB8krVyjYlYv9jbdd95TsqArEvNZ3
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 3iiAvtSozcaRvWNQdbGKSL0dAhBHGFSWFbqOYeTWwVNL8d7M6jbIzdmtXHD7mGBnvpGoHw8oaWAO
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: NELz7igb5bBWFXvMCirWY+bcTkqlKhs9CzVUG2rFukoG+bplwvpm53+mqAhGLpb2Mtv88oyBN83m
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: yaeOd3ob8h4DbMdlPyPp7a7bUB/tLW2LAuI8zWBdEAf9eSI4OQeMU7xgDQoz4K0M1HCa1vaEm5Ec
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: NJtD3kQVqSrqEMuguQbDw+OlZEu5LP3QwdvRE1ItZW2gIZPOyD/aRvfVccM0Ai5NcsZapCmNz7t5
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: CraxsRat.exeBinary or memory string: gBe3XYsV4oDQui+aRx3UrFHgfs1fic0Kn52gAbE1U8oRoxkPEGS449lSwjy9oOG6mpCuDTVk4kVL
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KVMciNxbei79M7jaHiq0apTnxb14L4BwWcXmsJT3ShdGlGxLjI14udCHHq6xiiTbNTy2v3DTh/mB
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wELPqEMugsOI9fRYfEvl9uhyQvTwr5nU68yLFBOZZCvz8CueGeOhB1OuN+zSZdTR7qQ0iQQnhJBj
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FUC6ZMk3mh/cFeBcYt1kX0Yg9Ykx3WMHAv/mT1HudwzSgpvmciRytdEIRvXhRzJ5qXaWkSAfLvcf
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 4jt7p+OSU8ch0NXYaFBkBAYMGlHgFS0RAgBtyXiFy9loda1WPycGJnijKluLqJi4SF79OE0h2Hn7
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 4u9rlxLsHJnnp2wiQP6k0DgvVmciaqplDTFcCcE0dGfmHrr5Pd0XBkVa5pQHO7KShtZvabXEyd7l
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: bOGPUz2Z1G/QfdjFJo7QzHMMz4cfOwasT2P97ByonBdID73LKbCfus4zvmcIDN5wrTGbxLbgK5aU
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: HmRckf8p+WD1FJ7j/PiZ7Wk6qEmUKaEDgARXU0HtDS32EufyWGfX6P/KYein9SwJOQetj//YwiMf
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: m7iDErpFR5XIY/hhECGlQX+yfRy98F3cHHd0J9Pb8+PuwfLhQGXAVxRmXW70qvmCi3xauxUvFRYH
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: YJxf2AUxSzBZXse6EjPZISpFgpGg7bgwWQ7w9ICVhzcKOlTdjhOTrxt7sbjQK5fy0ZodJqeMuIWZ
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 64CJCukzQR9vu/OTVD8sbeCkhY5Q/hgFStHqVIA7vRsjht3DLUrMAI7ld1x6Nxcf/zDezF54rWdU
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5BFDF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Wr8Tr69FDedKdnfHQ59zd82MisZFwCAE9qZotz/epkNbuK4TfC0MYYKHIjc3naqVdG/TAHfvmCIZ
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: lnnTUrbwq/Mib16r/zzyVMci2kG4hMtqBOyeFC+cQlx9o7pVSQU8kH8onVCdtbj7AM7+mI2o5uWl
Source: CraxsRat.exe, 00000000.00000000.1660913981.000001B5C07F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 7H+3SiHp1VmcIoj2x0PnuQW0c8dCW2VOwMUQxb+jysHlQfeh44BD8u0nN2avBIvnJS3QbJHAdS6j
Source: C:\Users\user\Desktop\CraxsRat.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\CraxsRat.exeQueries volume information: C:\Users\user\Desktop\CraxsRat.exe VolumeInformationJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1503875 Sample: CraxsRat.exe Startdate: 04/09/2024 Architecture: WINDOWS Score: 60 13 Antivirus / Scanner detection for submitted sample 2->13 15 Multi AV Scanner detection for submitted file 2->15 17 Machine Learning detection for sample 2->17 6 CraxsRat.exe 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started        file5 11 C:\ProgramData\Microsoft\...\Report.wer, Unicode 8->11 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
CraxsRat.exe37%ReversingLabsByteCode-MSIL.Trojan.SpyNote
CraxsRat.exe43%VirustotalBrowse
CraxsRat.exe100%AviraTR/SpyNote.gnjzh
CraxsRat.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.css0%Avira URL Cloudsafe
https://api.mapbox.com/styles/v1/0%Avira URL Cloudsafe
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.js0%Avira URL Cloudsafe
https://api.mapbox.com/styles/v1/0%VirustotalBrowse
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.js0%VirustotalBrowse
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.css0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.cssCraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://api.tiles.mapbox.com/mapbox-gl-js/v1.0.0/mapbox-gl.jsCraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://api.mapbox.com/styles/v1/CraxsRat.exe, 00000000.00000000.1660913981.000001B5C297E000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1503875
Start date and time:2024-09-04 04:29:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Sample name:CraxsRat.exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8521877902150183
Encrypted:false
SSDEEP:96:ucUF5tSMy7s5nmzxymTpQXIDcQtDc6tDIscE6cw3P+BHUHZ0ownOgFkEwH3d2FYA:ahSMy7nA0PlrQCaWazuiFSZ24lO8wg
MD5:A86787A781D60ADB0CAA2375D7BFE387
SHA1:353C35C7FE2403CA1FB3FF7E61CACC78DADD3C63
SHA-256:554934741BC24A7C94342BF402DB3B934AAABC63A062519C9E3B5DB9036766DD
SHA-512:FA32A6DFEC49DAE0CD6A1773E624F91924A97A1EF2A34C86BBC1009A4F99B128A983D95D9189255A7F3CC312A55044CBC37E2B1080C83E8619B1672B2B45BDCA
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.8.9.0.6.1.1.7.0.9.7.5.2.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.8.9.0.6.1.2.4.2.8.5.0.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.b.e.e.0.3.6.0.-.f.2.6.a.-.4.1.d.e.-.8.6.6.e.-.7.d.f.8.1.8.3.f.f.8.2.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.d.4.f.5.1.4.-.3.a.0.d.-.4.d.a.8.-.b.8.d.a.-.f.7.e.4.e.e.2.7.5.7.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.r.a.x.s.R.a.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.r.a.x.s.R.a.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.4.8.-.0.0.0.1.-.0.0.1.4.-.2.b.2.5.-.b.7.5.9.7.2.f.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.2.4.0.1.0.4.5.2.6.2.d.3.b.e.6.2.8.c.5.0.9.c.3.2.8.7.9.d.2.6.e.0.0.0.0.0.0.0.0.!.0.0.0.0.5.b.0.5.0.e.b.8.8.f.1.e.9.9.5.5.d.4.f.e.7.0.d.a.5.1.e.2.f.e.c.d.1.7.9.8.1.5.f.a.!.C.r.a.x.s.R.a.t...e.x.e.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Wed Sep 4 02:30:12 2024, 0x1205a4 type
Category:dropped
Size (bytes):238194
Entropy (8bit):2.721526758892291
Encrypted:false
SSDEEP:1536:TiUchI0Z9jCC8jH/RkmXh5+vMktDY4BD/sfL:TiJI61CCqJJ3+vbtDY4BbsfL
MD5:818D568BFE4DFD029AEBEAF66990E323
SHA1:9EEA1CD36A1AD52B1378DC38092B70E6003ACFCA
SHA-256:E229A2F272B425D7D9FF52539AA1FCD60185608B5284C8E013E45F16F832DBBA
SHA-512:E1D59D2155EC10DE0CAC331EF7387339D520F09978CB7E0F0E6360DE6E4CDC295609EBC5B85C3D09A1EF2D191DB660F03B1F0CB8D4757B427ED7298463DF878C
Malicious:false
Reputation:low
Preview:MDMP..a..... .......4..f....................................$........... ...........T....I..........l.......8...........T...........x...........................................................................................................eJ..............Lw......................T.......H...,..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8744
Entropy (8bit):3.7034589798890223
Encrypted:false
SSDEEP:192:R6l7wVeJpRT1Yq6Y9NKajgmf14dJ/oprT89bZlRfRzm:R6lXJ/T1Yq6YXvjgmf14dvZTfI
MD5:130F38BA5823FDA61AA6BC043BA99CE3
SHA1:B2FAE33838E56F5C6309888590B58C375EDDB1CE
SHA-256:1374829590210B7327B47EE1CB0BD618E4D1975E8D3D2C6DEF49660408030873
SHA-512:93C481DEA94C410D06174857E0FB8E76AF35E98682E86C297318AF6E1C53FB056383B2F4ADC3F05B45A087A9EE1E88253F9F7DB7EFCDDCFF4BE51652A98B776E
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.9.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4706
Entropy (8bit):4.472487755003208
Encrypted:false
SSDEEP:48:cvIwWl8zstJg771I9vJibXWpW8VY2Ym8M4JDsFvvyq85jVBRv6d:uIjfHI7eiK7VeJuvYzv6d
MD5:FA31F9484E605D175E48544F8F550737
SHA1:3112E60F0AFB73762BF806AC8CBF9BB9BA5BF8C7
SHA-256:CBA75DC0F2F1F9BDF4084E494B12D7C504AE9E3E785483D3FB0BEA967F35669B
SHA-512:1EC18A70CA9F4DEC9EA4C0CBC0562125DCBD6D40D32331A59A0BDA20AEB03892111710D92821B278DEDAEAE785BE2F7F8CD9A881AB60D489999E30D3F4CF3EB1
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="484892" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.4656437318488145
Encrypted:false
SSDEEP:6144:QIXfpi67eLPU9skLmb0b4xWSPKaJG8nAgejZMMhA2gX4WABl0uNTdwBCswSbZ:1XD94xWlLZMM6YFHN+Z
MD5:4DF576310B231F71A727B866DD0B98F6
SHA1:36498E84B65140DEA64DEF4011A91706D9F46C3F
SHA-256:58B9BFDB3E3E9CE1A894AF24CFA4CB09E0E700FB2FF5DAD665B6176D1FEC5AAE
SHA-512:F486E91A6E637329F7F20900CB252022A3364E18A3796B676B5F8A7D517DBC3E132F7A0E65D9AF4EAF224BCEA2983DB7382536532E34964A1B9BB9243B7214C8
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm"..]r..................................................................................................................................................................................................................................................................................................................................................i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.756404229158654
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
  • Win32 Executable (generic) a (10002005/4) 49.97%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:CraxsRat.exe
File size:66'290'688 bytes
MD5:a49c1840f7d6cdb3365048a571e98da0
SHA1:0f40e60972bceaa21d3d176a40719b32adedc499
SHA256:229238e78dc4155bfa95ee149819801a293ae635775776cbb2cbc371e9e9b0af
SHA512:a7e7d656d5252dcb8181883755095a52e7a3a3dd26a15fa6e433d9462f8e34d385080268a59ca89707df4d2286b06b0da92dd7bf4731390942cc2848b2e7a85f
SSDEEP:786432:7/+NX10EPRxXT0xHoA5AKF7zR/t6tKF+iSFgAxTKo2:L+NX10qTQTAMzttZmFXtI
TLSH:91E7230BF2A29C61C87287F26C270415F636CE82C91162A7317DF79A6EFD6D0CE5168D
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...P..<...F.......[... ...`....@.. ....................................`................................
Icon Hash:c0652511934f2f0e
Entrypoint:0x4335b9e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xC1F3C3A4 [Fri Feb 10 18:47:00 2073 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f35b4c0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f360000x42dc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f3c0000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x3f33ba40x3f33c005440d0dd7ade796f5ffa281d81431baeunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x3f360000x42dc0x440013bcf847d0175301ea0bac476b76e594False0.8395565257352942data7.58384454319619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x3f3c0000xc0x20054cdd4afc6512135a55fff35bebc7c80False0.044921875data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x3f361300x31d5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9844007211726895
RT_GROUP_ICON0x3f393080x14data1.05
RT_VERSION0x3f3931c0x360data0.4305555555555556
RT_MANIFEST0x3f3967c0xc60XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.39109848484848486
DLLImport
mscoree.dll_CorExeMain
No network behavior found
050100150s020406080100

Click to jump to process

050100150s0.0020406080MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:22:30:04
Start date:03/09/2024
Path:C:\Users\user\Desktop\CraxsRat.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\CraxsRat.exe"
Imagebase:0x1b5bf3f0000
File size:66'290'688 bytes
MD5 hash:A49C1840F7D6CDB3365048A571E98DA0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:22:30:11
Start date:03/09/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7496 -s 800
Imagebase:0x7ff631960000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

No disassembly