Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe
Resource
win10v2004-20220812-en
General
-
Target
19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe
-
Size
284KB
-
MD5
6bdc9ff6d873fd11039f751b73141395
-
SHA1
6aae1c39fcf1fef737b84f12ffe108c541ed73cd
-
SHA256
19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f
-
SHA512
1d49654571ea4cd4f1ee10dcca1b9c5c55a428649b5e065c5e2c77ac972c00bc8b524d228016b6795efd042454d1fe5314fc919328c0e59e9db13d50b3a71348
-
SSDEEP
3072:y0A2afa1bWbn4DpS41Zr8EbjfmNwXl1RgxfGDP8F2dqMOkeuF7SzoBBXnu:Ray1bWz4Dp7R8cA0l1RpLtJj7Skn+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceukoav.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 ceukoav.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /j" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /P" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /y" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /G" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /p" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /X" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /h" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /I" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /A" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /V" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /S" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /D" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /Q" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /v" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /m" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /e" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /u" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /l" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /J" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /r" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /x" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /F" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /s" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /E" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /k" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /t" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /M" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /g" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /L" 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /Z" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /n" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /L" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /o" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /B" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /w" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /b" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /W" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /z" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /C" ceukoav.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /U" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /H" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /i" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /q" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /T" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /N" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /f" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /Y" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /R" ceukoav.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /c" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /O" ceukoav.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceukoav = "C:\\Users\\Admin\\ceukoav.exe /a" ceukoav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe 2012 ceukoav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 2012 ceukoav.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2012 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 27 PID 1044 wrote to memory of 2012 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 27 PID 1044 wrote to memory of 2012 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 27 PID 1044 wrote to memory of 2012 1044 19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe"C:\Users\Admin\AppData\Local\Temp\19283d8a44fec9c1450025396641fd89ded480a4ac8b49f3523bb7bac39c283f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\ceukoav.exe"C:\Users\Admin\ceukoav.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD512c0a8ce4c3f7a2b9e9ddbb1c3958862
SHA1d84bd13ed98afd3334c382a08d07a66ce1976489
SHA256a993c8327b81c66815c8b0c8c14a7172b4edec79ff98cf0a6218e327ee15dfbe
SHA5127227c51086e87a361aa1e8a63441615bd94f4a0c7ef0777b65d6bcb66889072d649b9e37d34c5bec25d9eecb2cac4bd56fe627129f21f5db99acda2f797fdcf6
-
Filesize
284KB
MD512c0a8ce4c3f7a2b9e9ddbb1c3958862
SHA1d84bd13ed98afd3334c382a08d07a66ce1976489
SHA256a993c8327b81c66815c8b0c8c14a7172b4edec79ff98cf0a6218e327ee15dfbe
SHA5127227c51086e87a361aa1e8a63441615bd94f4a0c7ef0777b65d6bcb66889072d649b9e37d34c5bec25d9eecb2cac4bd56fe627129f21f5db99acda2f797fdcf6
-
Filesize
284KB
MD512c0a8ce4c3f7a2b9e9ddbb1c3958862
SHA1d84bd13ed98afd3334c382a08d07a66ce1976489
SHA256a993c8327b81c66815c8b0c8c14a7172b4edec79ff98cf0a6218e327ee15dfbe
SHA5127227c51086e87a361aa1e8a63441615bd94f4a0c7ef0777b65d6bcb66889072d649b9e37d34c5bec25d9eecb2cac4bd56fe627129f21f5db99acda2f797fdcf6
-
Filesize
284KB
MD512c0a8ce4c3f7a2b9e9ddbb1c3958862
SHA1d84bd13ed98afd3334c382a08d07a66ce1976489
SHA256a993c8327b81c66815c8b0c8c14a7172b4edec79ff98cf0a6218e327ee15dfbe
SHA5127227c51086e87a361aa1e8a63441615bd94f4a0c7ef0777b65d6bcb66889072d649b9e37d34c5bec25d9eecb2cac4bd56fe627129f21f5db99acda2f797fdcf6