Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe
Resource
win10v2004-20220812-en
General
-
Target
2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe
-
Size
140KB
-
MD5
148b9f88c38a5d684a14694322e60fe6
-
SHA1
d684f5b4d302846564f3345290e55e0344db755f
-
SHA256
2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b
-
SHA512
fd943d2f0eba6c7a33b4f5e414f6618b23a8d2638621400cebdc77f542cb0351bacc1b95cd01a084ee0247ade8d64e3535cfc9a7d2861258a3389f1bfde61bfc
-
SSDEEP
3072:H9PP7FuHCxABX562J7fT4PE6fUneYkLpE6H94oQZiE3+:dFufBJ1J7f8z9SOW8
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ciijo.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 ciijo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /X" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /E" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /V" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /j" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /Z" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /c" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /h" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /q" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /O" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /m" ciijo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /x" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /I" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /L" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /p" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /v" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /J" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /M" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /Z" 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /g" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /N" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /K" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /H" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /l" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /P" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /C" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /Y" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /i" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /B" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /W" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /S" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /U" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /e" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /d" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /n" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /R" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /s" ciijo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /b" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /A" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /k" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /u" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /z" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /t" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /G" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /r" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /T" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /w" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /Q" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /D" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /y" ciijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciijo = "C:\\Users\\Admin\\ciijo.exe /o" ciijo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe 4840 ciijo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 4840 ciijo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 4840 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 80 PID 1868 wrote to memory of 4840 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 80 PID 1868 wrote to memory of 4840 1868 2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe"C:\Users\Admin\AppData\Local\Temp\2a08a1b8c2058e644f9608bc8b9a0d586b0b06738b2f9626295af1acc8fabc1b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\ciijo.exe"C:\Users\Admin\ciijo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5c8b9829349ea8a25e58fa5cf9e1a3e16
SHA113f5fe5453a16cd28c0ee61ac877dd82e0010c76
SHA2561fdb2ea6d8821db47a453d2ffb7faf6dc398b92d88a55cfdc4720030070e9f6b
SHA51212350f61819932c7fe2423a6bc48b71bd6ee2b644f17c098ec34a20d99b47f6e9131b79a6f551859d3183d5e561d848b3d49862635495c889649b54db56d1ab9
-
Filesize
140KB
MD5c8b9829349ea8a25e58fa5cf9e1a3e16
SHA113f5fe5453a16cd28c0ee61ac877dd82e0010c76
SHA2561fdb2ea6d8821db47a453d2ffb7faf6dc398b92d88a55cfdc4720030070e9f6b
SHA51212350f61819932c7fe2423a6bc48b71bd6ee2b644f17c098ec34a20d99b47f6e9131b79a6f551859d3183d5e561d848b3d49862635495c889649b54db56d1ab9