Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
Goby_Red_Team_2.0.5_crack_by_hlop.7z
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
goby-win-x64-2.0.5-redteam-cracked_by_hlop/Goby.exe
Resource
win10v2004-20220812-en
General
-
Target
Goby_Red_Team_2.0.5_crack_by_hlop.7z
-
Size
118.3MB
-
MD5
5aaf46451cdc6bca8db526bf76484026
-
SHA1
592bdfdf9f49e9fc2d2267aac08b80937d40f510
-
SHA256
0f20af4a90fb5070fc602682a6117dd787d7d5a96a2645528b4fada310de06b7
-
SHA512
3e28ac7eb716c3d2d49dd3d0cc9e7dc2f5e114872b408f8a945a6c3f72665831a1fed122c007d43c03f934288cc79e7fa350fd4590f3adcefad75ce26a98ceef
-
SSDEEP
3145728:u9cbifXK5iVux/hmPMVa5VjD7nmW8xK+b7Y2xiuI6ghKLGj:Wcbif65iVux/hwMSDCWgnHzxiuI6ghr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4332 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe 4332 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Goby_Red_Team_2.0.5_crack_by_hlop.7z1⤵
- Modifies registry class
PID:3196
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4332