Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe
Resource
win10v2004-20220812-en
General
-
Target
bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe
-
Size
136KB
-
MD5
5eaee881ef24cc4c7560fa8a20bf74ff
-
SHA1
3efc287e47d60ed1fc3285dcfd44e859cee7363c
-
SHA256
bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b
-
SHA512
b2afd207e60eb7ea4429b32bf4d3c83acdb2cb7e17fa3ae02f4f09b5d8e852553a3736efbd09b0231288ddd63709b0153160bdda1e243266a470490fd6d435cf
-
SSDEEP
3072:BmFgwjBfQn7WbIqH0ybZBiOllyEmcP82+aVdOt66VGegmaT:BmxQn7WbIqH0ybZBiOllyE5D+aVkjseN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceolear.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 ceolear.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /R" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /k" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /o" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /i" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /V" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /a" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /u" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /C" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /P" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /U" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /s" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /A" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /L" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /y" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /X" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /S" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /f" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /w" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /Y" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /K" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /d" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /p" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /m" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /B" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /W" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /D" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /O" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /H" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /Q" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /J" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /x" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /e" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /n" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /j" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /G" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /v" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /Z" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /g" ceolear.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /T" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /z" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /M" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /l" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /I" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /b" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /q" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /h" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /N" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /E" ceolear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceolear = "C:\\Users\\Admin\\ceolear.exe /t" ceolear.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe 1876 ceolear.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4608 bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe 1876 ceolear.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1876 4608 bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe 82 PID 4608 wrote to memory of 1876 4608 bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe 82 PID 4608 wrote to memory of 1876 4608 bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe"C:\Users\Admin\AppData\Local\Temp\bbfddf30612f21c51d4df26fc3e9a8cf098a2bcf7223c0841470999fa742ee1b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\ceolear.exe"C:\Users\Admin\ceolear.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5eaf88a05b1f8b1a6f128c307aac69451
SHA1251c76f2a75790509652c29d9c556996f04d082f
SHA25687f4fe8f23bcaba892c1bfcef2c73b911d0d96e65a5a46b69fea8012b44ccb7d
SHA512a9bf259283d99fc45501b59fa0afe8afd02a7fbf83f6e70525d1f37627746f345cd827e76974ac19e3a961b613299453a3eec11f41130252092e9370c070812b
-
Filesize
136KB
MD5eaf88a05b1f8b1a6f128c307aac69451
SHA1251c76f2a75790509652c29d9c556996f04d082f
SHA25687f4fe8f23bcaba892c1bfcef2c73b911d0d96e65a5a46b69fea8012b44ccb7d
SHA512a9bf259283d99fc45501b59fa0afe8afd02a7fbf83f6e70525d1f37627746f345cd827e76974ac19e3a961b613299453a3eec11f41130252092e9370c070812b