General
-
Target
Cryos Woofer.exe
-
Size
3.2MB
-
Sample
241207-2pp3tsxrct
-
MD5
2129b89ba0537555b185f6fb819c0693
-
SHA1
008c94d1dc3bcf3ae3ce4c735fad94f810b844b8
-
SHA256
b250a8cb9042a96d90850ef165b43cd50624878916ab0dd259a577032912e055
-
SHA512
005b4155242b4711b07e34f1435a6e7268d5d3217a44f99df6137280647d2673a078ea0d8e1f8ba192a2209777cf2ad0dc960373cceda11be0b4ecf36fc2048b
-
SSDEEP
98304:t2BvT8knglXKHw6ub2NQOtmnuu4Yv21O5PEsOPR:t2ZYPGPzQ0muu4Yv/PROPR
Static task
static1
Behavioral task
behavioral1
Sample
Cryos Woofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Cryos Woofer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Cryos Woofer.exe
-
Size
3.2MB
-
MD5
2129b89ba0537555b185f6fb819c0693
-
SHA1
008c94d1dc3bcf3ae3ce4c735fad94f810b844b8
-
SHA256
b250a8cb9042a96d90850ef165b43cd50624878916ab0dd259a577032912e055
-
SHA512
005b4155242b4711b07e34f1435a6e7268d5d3217a44f99df6137280647d2673a078ea0d8e1f8ba192a2209777cf2ad0dc960373cceda11be0b4ecf36fc2048b
-
SSDEEP
98304:t2BvT8knglXKHw6ub2NQOtmnuu4Yv21O5PEsOPR:t2ZYPGPzQ0muu4Yv/PROPR
Score10/10-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-