Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Cryonix BE...01.rar
windows11-21h2-x64
3Cryonix BE...pi.dll
windows11-21h2-x64
1Cryonix BE...PI.dll
windows11-21h2-x64
1Cryonix BE...s.json
windows11-21h2-x64
3Cryonix BE...ta.exe
windows11-21h2-x64
1Cryonix BE...ta.exe
windows11-21h2-x64
1Cryonix BE...ta.pdb
windows11-21h2-x64
3Cryonix BE...g.json
windows11-21h2-x64
3Cryonix BE...it.dll
windows11-21h2-x64
1Cryonix BE...in.exe
windows11-21h2-x64
7Cryonix BE...on.txt
windows11-21h2-x64
3Analysis
-
max time kernel
493s -
max time network
505s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/09/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
Cryonix BETA V1.01.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Cryonix BETA V1.01/2024 star of the night Api.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Cryonix BETA V1.01/Bin/API.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Cryonix BETA V1.01/Cryonix beta.deps.json
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Cryonix BETA V1.01/Cryonix beta.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Cryonix BETA V1.01/Cryonix beta.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Cryonix BETA V1.01/Cryonix beta.pdb
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Cryonix BETA V1.01/Cryonix beta.runtimeconfig.json
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Cryonix BETA V1.01/ICSharpCode.AvalonEdit.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Cryonix BETA V1.01/main.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Cryonix BETA V1.01/version.txt
Resource
win11-20240802-en
General
-
Target
Cryonix BETA V1.01/version.txt
-
Size
5B
-
MD5
1237637816a1ef8e3a33c1191d9dea66
-
SHA1
e5906c31c05c50ae1bcfde5f3a47eee483bc23c9
-
SHA256
20d2cb096d1ab41a4140246d12f07bf6b8cb743fd48122b72532c03d44c5c14a
-
SHA512
e6bcf72302fdf2139b5f9d77dc0be3458daef8ad42b81842371dffb98307479a8a8e053eac8f27eea9cbfc47cb60248ab0fecd994bab3c2359c1a9d5dab508fe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1560 3880 cmd.exe 79 PID 3880 wrote to memory of 1560 3880 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Cryonix BETA V1.01\version.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Cryonix BETA V1.01\version.txt2⤵PID:1560
-