Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 04:29

General

  • Target

    youtube-view-bot-main/data/project.xml

  • Size

    100B

  • MD5

    fe113c269c843cda8d60c775528cb7c0

  • SHA1

    b009758329448ebe16da5389e4e7260361ea9f4f

  • SHA256

    b799195508d0bd192cc501813d6ead5a951d4381c938667550848bcee55d6eaa

  • SHA512

    dec9320eef67f1953d0e1e1d27aaf39070b3198d0fa495e71a7c0b1ee31435521f25b83604ff1035cc4bfd93b3049b62ac8e4424d36b9ed1f9ca775c87450ed1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\youtube-view-bot-main\data\project.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84db54afc5aa917b6ad0d760d6d09f8d

    SHA1

    0ba351921f473cbf4ecdc16b4194970396733639

    SHA256

    1502b078cbb87b7f5b66d3f53635229d57f9502ea73cd1b3545093c530991f60

    SHA512

    d407a3204b672a8b117938855e349af59197fe93e4b254e687b944aa7867a0dfec91e5d4bd4dfc901936b1fa41b445cf4826fcb8e82cd8b19e3a1836a7379a02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    722e0b8f52c4f97566f4f83650eb4bb4

    SHA1

    1fed2a1fd6e2dc2005b4631e123c7b610d6e69f8

    SHA256

    399ed339ff1b830a78c075dc883674f6143fa5d0801a05efa1483a844b25d79e

    SHA512

    a667dcc6a8e837d5f51d3307528bcc7abcc60d7e45e271e182f7c223c3573adb8b1b6903028e5a13de57779cd3c5463a7a92c55215d98535739fcd33aefb5a02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba4836c439c020a5077807d3efb8e84c

    SHA1

    7bd0ca174d6bd9c0b231cdd5319ada234589f639

    SHA256

    4ba2f2cb3cb3c2a7e2f211a1af727ef037756a1886b4246c50d73569ae805092

    SHA512

    d775faab76316be7d4c11a77553e30aec57ea0d71f7f0a50b26638339d8fd666e48e095a8ad608689823ddb21922c3bc7acf700445dd4c3124c1d6acd18ac7b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    935b8ae49bdaf017804bbc8c2992a882

    SHA1

    8883d19096ee285d90bf3b322712844145f1b1a3

    SHA256

    55e85c3b95c6f51db36060e9bdb5e0fce7f76b0bb84abaa313dde07f77702f63

    SHA512

    22fd515c514359fec3078e9455486638a8edd6614a46ff2fc737f8303a942137f1151418a69adc69e73c79e2d2745147871a492eaf4b9b6da6d667131d3ebac0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de20b8f3605e9a4432c199a32b7b9201

    SHA1

    853126896cfab585106a88cc822e8a4b85d858e6

    SHA256

    12aa571c350269f3215f1b46cd499eadd9445b32a8a6e2f9d32591b60c1465e6

    SHA512

    55fb6186dba200bd36fac195e9a4194989e08c35842f14233ebb6b9856801e8dbd828559fb1a704aab4fd4a1de1cdd3460320ba592f160bd47c40d573bc8d85e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82a0f643ef335667728c474676ecfe8d

    SHA1

    831a5e79ed97f293b221fc10252ea483639e5785

    SHA256

    6bd91af628d2a5cb08eb625ad6bf3e4103a61b7932fce4488c9967b54e81fe1d

    SHA512

    fad3d72cc230393f115889c2a629d5ef2da55f26792d173e5bdedba9000a95b212f9862798ca58aa134f1938488bb9f345908a37917ac71d267570856e1b1e84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd09057572a7ad90704f3f5d417a039a

    SHA1

    3222631170c285fbaefbf5ca78e264869a3bb4a2

    SHA256

    8a6dd5e467811e857e578082a5bdc95411a02d3fee25cc573451bd39cf19699b

    SHA512

    f669ff7dc467f53a811ae813e432256860ec80cffb163e6aaeb192bd57da03e70823882afaf93786fdeb174205d219a0e563bb69681d1a5c2ee8c08e0730759b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6baecf550bf4cc2918a3c8d828560d6

    SHA1

    00ae51f1916bff2aee6a199f5cae25e65f11d04a

    SHA256

    e5e8dcaa886906e1686f6de0ff6b94351fa28c5588dd0b6d9742a850c3ff81b6

    SHA512

    c5143131ab1602be09d061f03131eb8886944981fbcade4ae331d162a212d183bbcf0b9ba3c77350ece410aed4ec2212946f7b224489e12be689caef796d0375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cd3012e4661c4fd2257f89932659f50

    SHA1

    c95c5e5d5740410619cfdfe3b834bcfdb86b822f

    SHA256

    f8477ab7141bc2ec085fca5b6e930103cdd7a0e782fa217b7f4cfb7d3d86aa64

    SHA512

    9999f72ab62f915913cf1162740592a36abe63c80b0a7e8b42d21b46780f40532dc1666c3e0df768169ed89f46783a1db3dd9778c8fc040bbc9f814004b791f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db05c4470f1fc3b40c65ed5b18f7dae7

    SHA1

    18d47af11f5742f4fd074c7edfc588f26e1ad10a

    SHA256

    6a2d17f648968a9d67d25880bd4d31c3aff48be9f4f0ade26e3655788a7bdc7e

    SHA512

    f640f0ae257cc746dbadeebf23f1796f35a9c9cc179231afe47cad38c28073b08c5961b216f971e65139326b27357eb21d5240048c5290b395dac36010627f92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0769dec07426f8558f53dfeda392087a

    SHA1

    933564e7dd3f3694815dec5a0cead44289d2ec59

    SHA256

    54dc80ac79015e8260eb6980ef610641b7a6a467d7975509dbc9c49ac5315b0e

    SHA512

    f597ed36f96fba0383339dd6b5a5b8a22ca6f59a50f1a37e0fa401796e2083bc02dc94a4dff7879506c367b5cae12d431aade8f1802d0ff9ca147b97bd183a8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1d9128c9956a5c98694d767bcf979e0

    SHA1

    b0d5d191ae1defdb32d0e77b5f5aaad8204fc3ed

    SHA256

    e5309ffbd685ec09f70d5c1471bfd58ab7b438437a630ff395eca1e7f79e41be

    SHA512

    b29ea6340e2c403931ec649b23d41a9839d9441e07529c306643ed1053f13a9b4d7466ab91892ccdc76583865b319f2980afab42cb9c0b72d82c07f24460bfb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e5a947fe499c2d8df793acbbedf2262

    SHA1

    00788d229e2d5655e80ce6af5af02eaf6467f600

    SHA256

    7d5854f2c872ca93e13b597a7caf35cd27d4c0cf8b8e519dcf8615e5e2dca0f7

    SHA512

    6f194fec03b37e551d7a5eb76eca5db1c43bf35484754c23b9574f0a375a93d3ea79022eff08906e117ee332366be1a195dd71c5aa919bc4b057d1e9b357d842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7a078af9a1202e1bcccb334ef1df840

    SHA1

    7257d38436d0ee67abe2b92737d3eb7532c4d9fa

    SHA256

    3d3aebf9a76cd7a32ce612085206a193a667770e6d42d978824d3b236bf6f246

    SHA512

    ce0cbe571d0d3907badfc0c09f0c556f950f47cfb0db07098d6de6c1278793eb85648b201288f9bd66f103f3c663a3c8b26cba3a42bf764b93adb43b8af9bc48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c79d0ffec99fa4600498a602e572db0c

    SHA1

    cbc60f48afab1ccebcb1c8dbf6c12f35ea8a0a87

    SHA256

    4894cb79e5b4e36dc8d6b9b41f0175b5bcaae9a2607c40637c6b93505af5af77

    SHA512

    3394d795888d9418cf283d24d7a4a6e54537cb6dfd13d0fab7ab02e5e4c4481d838a9d098d8a8b1a65d721fe1ac98a3b7f62dce3c49ed8b2747ad8c8de15b7ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20923f71545da0e7a340bccf8441961d

    SHA1

    d2c9c8e18035a58cd2a284405c7427468dcf206e

    SHA256

    981ab547b46d446886312276dfda9f3a8fa1e89fab5a292766c2118a3c01c941

    SHA512

    0eede2d2342b56be8d30e3a33ace25be57f9ebbc7b393ff3ecca64a0565d8e6771cc7368b61a5c3969974839086c62a7e5bc6c35219643ac2951aab45c62e330

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c41d68f7b859108a2ea4f9d16eb8dc5

    SHA1

    38f6e2afdfee417e65c53fceee0d52e89316cc64

    SHA256

    03efcbe8e3202193db06add065350cd6d7b4248bb545fb480b10793169106aae

    SHA512

    b2323a01619a108fc887b2bc8795c097f346a9ed90f1c9656d88c387e6e98a93af5f52f4cee4188194dec6cf778f2671b966db003f912f64b3b60a7e1298ac6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43d6362795b745e2e92a0ea5c7909c6a

    SHA1

    00a8fab329ae477d6693fab3bd152780a7b41729

    SHA256

    c4ae312cec37324c17293d7c8324d8e9c6019a7782280a00e50c4b0d65dec736

    SHA512

    ee173045bb53a12ea1199bc2c44dea612a11a4915621e2e17cc0a71caa86533b128fffe3eae56343103bb026908687978560c92e97884b7eab39bc985ab959c3

  • C:\Users\Admin\AppData\Local\Temp\CabBC6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC75.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b