Overview
overview
10Static
static
1Cryos Woofer.exe
windows10-2004-x64
10.data
windows10-2004-x64
3.rdata
windows10-2004-x64
3.reloc
windows10-2004-x64
3.rsrc/DIALOG/105
windows10-2004-x64
1.rsrc/DIALOG/106
windows10-2004-x64
1.rsrc/DIALOG/111
windows10-2004-x64
1.rsrc/GROUP_ICON/103
windows10-2004-x64
1.rsrc/ICON/1.png
windows10-2004-x64
3.rsrc/ICON/2.png
windows10-2004-x64
3.rsrc/MANIFEST/1.xml
windows10-2004-x64
1.text
windows10-2004-x64
3CERTIFICATE
windows10-2004-x64
1[0]
windows10-2004-x64
1[1]
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
Cryos Woofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
.data
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
.rdata
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
.reloc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
.rsrc/DIALOG/105
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
.rsrc/DIALOG/106
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
.rsrc/DIALOG/111
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
.rsrc/GROUP_ICON/103
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
.rsrc/ICON/1.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
.rsrc/ICON/2.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
.rsrc/MANIFEST/1.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
.text
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CERTIFICATE
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
[0]
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
[1]
Resource
win10v2004-20241007-en
General
-
Target
.text
-
Size
29KB
-
MD5
419d4e1be1ac35a5db9c47f553b27cea
-
SHA1
81b88fd425125756d41fada07ae1534b10c43c01
-
SHA256
97e6da0d74b3c02e39efeb02c6f019b353e9891a3ea453f2fa0ecca3c3e526e2
-
SHA512
17fea0a8c963ec9a6bdc562de750a4f8f527f2555f02d9df88b4e9ad41bdbd7fc37c0a303562f4834c195b485cc61284b6e19723bb376c23e08642884b70c121
-
SSDEEP
768:JsGPXyrvq/Sb6LbQ7eM468vxRu1rnd6ffMmKZS/5hK9G3/2o9+4gn:WGarUa6LowvuhdNYh2Gf9rg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4400 OpenWith.exe