Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
Resource
win10v2004-20220901-en
General
-
Target
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
-
Size
120KB
-
MD5
53c8cf3248b56ceda5d9563363607566
-
SHA1
a220aa9e0845c4ed9e29c2d41dc2f2dd4efb193b
-
SHA256
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418
-
SHA512
79248618f765ec4509e6b243ac7e27a01cf2fb567f7c9bd8751445e44835b6cf5d540af4678b5cfd04bb63b1b0bee4d21f90fad03b307095bff9b1dbf1a4d8ad
-
SSDEEP
1536:tusUZAfeEvVkdXGE2Mtf9oUrUQKVQg9F5tkV7pjuX5e6wTeU/60hQHy4kt5r:/UAemVkR2MtF3SV9qThay5r
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cueweub.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 cueweub.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /s" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /t" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /y" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /d" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /e" cueweub.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /q" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /h" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /f" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /r" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /k" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /m" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /g" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /u" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /a" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /w" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /p" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /z" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /l" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /i" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /b" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /j" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /c" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /a" c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /n" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /o" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /x" cueweub.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueweub = "C:\\Users\\Admin\\cueweub.exe /v" cueweub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe 2424 cueweub.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 2424 cueweub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2424 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 85 PID 4932 wrote to memory of 2424 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 85 PID 4932 wrote to memory of 2424 4932 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe"C:\Users\Admin\AppData\Local\Temp\c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\cueweub.exe"C:\Users\Admin\cueweub.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD59ed6874260ac1afdf9fa9cc66c1bb4e1
SHA159cfe640e8176f89051736549209f76d99a11241
SHA2562474a2abc977c5825a6ab5017ac879af19fc7666d74249c70e2aea967d5abf2c
SHA512ed84724c6ac30b8d12a0a73fc8c810365a998888ef560a38bbbc0d74d6d53df194f2cb35a83445743fc85a99bcf6e8e84b21889eddbfc9abf74b38cd20cb803d
-
Filesize
120KB
MD59ed6874260ac1afdf9fa9cc66c1bb4e1
SHA159cfe640e8176f89051736549209f76d99a11241
SHA2562474a2abc977c5825a6ab5017ac879af19fc7666d74249c70e2aea967d5abf2c
SHA512ed84724c6ac30b8d12a0a73fc8c810365a998888ef560a38bbbc0d74d6d53df194f2cb35a83445743fc85a99bcf6e8e84b21889eddbfc9abf74b38cd20cb803d