Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
Kidux32.dll
windows7-x64
1Kidux32.dll
windows10-2004-x64
1Kidux64.dll
windows7-x64
1Kidux64.dll
windows10-2004-x64
1Qt5Core.exe
windows7-x64
1Qt5Core.exe
windows10-2004-x64
1YouTube Pr....0.exe
windows7-x64
8YouTube Pr....0.exe
windows10-2004-x64
8alocal.exe
windows7-x64
1alocal.exe
windows10-2004-x64
1drivefsext.exe
windows7-x64
1drivefsext.exe
windows10-2004-x64
1Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
Kidux32.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Kidux32.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Kidux64.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Kidux64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Qt5Core.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Qt5Core.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
YouTube Proxy Viewer v1.0.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
YouTube Proxy Viewer v1.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
alocal.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
alocal.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
drivefsext.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
drivefsext.exe
Resource
win10v2004-20220812-en
General
-
Target
YouTube Proxy Viewer v1.0.exe
-
Size
806KB
-
MD5
139b38e1b9d62ae812909046d9703481
-
SHA1
d1b05419556212cb05fcdadeb93eb93f7856454c
-
SHA256
c1266489d112c62eb4a5f9575cc2331e1f33cd73bdec36a7a6f7a76b598154bc
-
SHA512
cabb897749ae9c1a8a3b1f6089434217d0906283b81c800d7261f692c17ad21e1fc210efbd0634aa7eeea3571cfe2d0b88c274183333a8d5d95edb2b8d00df15
-
SSDEEP
24576:nwCwGzxgABEyqY6M3e9lypKb1+YIVXZUTti:nwCwMxgAeyqY6M3e9IqIVJMti
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1648 UserOOBE.exe 1532 winsrvhost.exe -
Loads dropped DLL 4 IoCs
pid Process 932 YouTube Proxy Viewer v1.0.exe 932 YouTube Proxy Viewer v1.0.exe 932 YouTube Proxy Viewer v1.0.exe 932 YouTube Proxy Viewer v1.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main Qt5Core.cfg -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1812 Qt5Core.cfg 1812 Qt5Core.cfg -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 932 wrote to memory of 1648 932 YouTube Proxy Viewer v1.0.exe 28 PID 932 wrote to memory of 1648 932 YouTube Proxy Viewer v1.0.exe 28 PID 932 wrote to memory of 1648 932 YouTube Proxy Viewer v1.0.exe 28 PID 932 wrote to memory of 1648 932 YouTube Proxy Viewer v1.0.exe 28 PID 932 wrote to memory of 1812 932 YouTube Proxy Viewer v1.0.exe 29 PID 932 wrote to memory of 1812 932 YouTube Proxy Viewer v1.0.exe 29 PID 932 wrote to memory of 1812 932 YouTube Proxy Viewer v1.0.exe 29 PID 932 wrote to memory of 1812 932 YouTube Proxy Viewer v1.0.exe 29 PID 932 wrote to memory of 1532 932 YouTube Proxy Viewer v1.0.exe 30 PID 932 wrote to memory of 1532 932 YouTube Proxy Viewer v1.0.exe 30 PID 932 wrote to memory of 1532 932 YouTube Proxy Viewer v1.0.exe 30 PID 932 wrote to memory of 1532 932 YouTube Proxy Viewer v1.0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\YouTube Proxy Viewer v1.0.exe"C:\Users\Admin\AppData\Local\Temp\YouTube Proxy Viewer v1.0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\ProgramData\UserOOBE\UserOOBE.exeC:\ProgramData\\UserOOBE\\UserOOBE.exe ,.2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\Qt5Core.cfgQt5Core.cfg2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\ProgramData\winsrvhost\winsrvhost.exeC:\ProgramData\\winsrvhost\\winsrvhost.exe2⤵
- Executes dropped EXE
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bc6f4d046400dfdb6d778fb1926766b6
SHA1ce51637b97296bc4427bffcbc30273532fc2a212
SHA25629615fb0394b6ca88d8982d5c005292de3b96e2096b3b6994a55eaf1fdd5c847
SHA512b15a0f2111a485b65a5490f874646dd12c2f62a19912a1cb2d95a9c40fb42cdd659ca2acaab80d3268d570ea09ae46225721aab28567f718860bed0a71258555
-
Filesize
284KB
MD5a317a0cc1f48e6529d5e87f4212a518b
SHA1a15b80d2427f47a3efc963630132534146734547
SHA25630ecbcec13191cd883eb65634af367c4c69cb82ddc3d7a79d40b7786a9547b27
SHA512d923e2e7624ba764052ce72d27d20aadbade84cfc39ce8ed2d20c9bf9045a70b533cb8a6d05db0ffff3f66595d40273c02d2bf9a36e6baf4cf52b4700905cc4f
-
Filesize
251KB
MD5bc6f4d046400dfdb6d778fb1926766b6
SHA1ce51637b97296bc4427bffcbc30273532fc2a212
SHA25629615fb0394b6ca88d8982d5c005292de3b96e2096b3b6994a55eaf1fdd5c847
SHA512b15a0f2111a485b65a5490f874646dd12c2f62a19912a1cb2d95a9c40fb42cdd659ca2acaab80d3268d570ea09ae46225721aab28567f718860bed0a71258555
-
Filesize
251KB
MD5bc6f4d046400dfdb6d778fb1926766b6
SHA1ce51637b97296bc4427bffcbc30273532fc2a212
SHA25629615fb0394b6ca88d8982d5c005292de3b96e2096b3b6994a55eaf1fdd5c847
SHA512b15a0f2111a485b65a5490f874646dd12c2f62a19912a1cb2d95a9c40fb42cdd659ca2acaab80d3268d570ea09ae46225721aab28567f718860bed0a71258555
-
Filesize
284KB
MD5a317a0cc1f48e6529d5e87f4212a518b
SHA1a15b80d2427f47a3efc963630132534146734547
SHA25630ecbcec13191cd883eb65634af367c4c69cb82ddc3d7a79d40b7786a9547b27
SHA512d923e2e7624ba764052ce72d27d20aadbade84cfc39ce8ed2d20c9bf9045a70b533cb8a6d05db0ffff3f66595d40273c02d2bf9a36e6baf4cf52b4700905cc4f
-
Filesize
284KB
MD5a317a0cc1f48e6529d5e87f4212a518b
SHA1a15b80d2427f47a3efc963630132534146734547
SHA25630ecbcec13191cd883eb65634af367c4c69cb82ddc3d7a79d40b7786a9547b27
SHA512d923e2e7624ba764052ce72d27d20aadbade84cfc39ce8ed2d20c9bf9045a70b533cb8a6d05db0ffff3f66595d40273c02d2bf9a36e6baf4cf52b4700905cc4f