Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10OSbot judi...BC.exe
windows7-x64
1OSbot judi...BC.exe
windows10-2004-x64
3OSBC.pyc
windows7-x64
3OSBC.pyc
windows10-2004-x64
3OSbot judi...sl.dll
windows7-x64
1OSbot judi...sl.dll
windows10-2004-x64
1OSbot judi...-0.dll
windows10-2004-x64
1OSbot judi...64.dll
windows7-x64
1OSbot judi...64.dll
windows10-2004-x64
1OSbot judi..._1.dll
windows7-x64
1OSbot judi..._1.dll
windows10-2004-x64
1Resubmissions
03/05/2024, 18:40
240503-xa7xwagb26 1003/05/2024, 18:19
240503-wynngach5t 1003/05/2024, 15:38
240503-s26fxaad2t 10Analysis
-
max time kernel
68s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 18:40
Behavioral task
behavioral1
Sample
OSbot judicable/OSBC.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OSbot judicable/OSBC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
OSBC.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
OSBC.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
OSbot judicable/_internal/_ssl.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
OSbot judicable/_internal/_ssl.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
OSbot judicable/_internal/api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
OSbot judicable/_internal/kiwisolver/_cext.cp310-win_amd64.dll
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
OSbot judicable/_internal/kiwisolver/_cext.cp310-win_amd64.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral10
Sample
OSbot judicable/_internal/libcrypto-1_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
OSbot judicable/_internal/libcrypto-1_1.dll
Resource
win10v2004-20240419-en
General
-
Target
OSBC.pyc
-
Size
8KB
-
MD5
841437319f7c62d64daedd2eecee339e
-
SHA1
7fa7cdccb82864f0a237294df9eff9871ccf2a26
-
SHA256
4bb5d50dfe5d05456aa94206c226d1b6c31392a1de2da84bb84feed175f48cce
-
SHA512
82972afd227779cf04c96d74ba7fd016f5d85d8cdd8ce01ba1f86349f74b4dd1a490a4527b170db59a90262ae1b38f780353278cfc3509b82ce230625237c52f
-
SSDEEP
192:1jz3oLX+DdZuMbV7Q5Jz6MEm+zymuzugcC3W3wP:Nz3oOQzzammcc+W3wP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4100 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5108 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4100 5108 OpenWith.exe 91 PID 5108 wrote to memory of 4100 5108 OpenWith.exe 91
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\OSBC.pyc1⤵
- Modifies registry class
PID:912
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\OSBC.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:4100
-