Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18/07/2024, 15:00
Behavioral task
behavioral1
Sample
Boobies.pyc
Resource
win10-20240404-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Boobies.pyc
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
Boobies.pyc
-
Size
29KB
-
MD5
87a1ce96d5613ca6d45b1d77c02e8a48
-
SHA1
1dd52434ed50e9a915fd7ee429ddcdd576618f3a
-
SHA256
7bd5059176104056fc3dd3ecdabd09af5a0d4f93debdb36bb1987fb01e88b75d
-
SHA512
b55fde4851d43168be76fd6a2fafc742c637cce8d929e43a72a33b389c9aa91c03b78e4b3a305ad778c7da71b8377063ede2c98aedfec1a5f0f34d155d448848
-
SSDEEP
768:3+lVovnrSxRYjtSD9ASIBg49Uy6navHSpnLrVhHv4q0BSqCJr:30ovr1AvM+navypKBSqQr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4152 OpenWith.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe 4152 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Boobies.pyc1⤵
- Modifies registry class
PID:524
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4152