Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe
Resource
win10v2004-20220812-en
General
-
Target
d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe
-
Size
80KB
-
MD5
911f0485df4ebf942351c562e93034b1
-
SHA1
1ff933fa431144c84b480de739ec5296223ed60b
-
SHA256
d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836
-
SHA512
c234b89ec6c70baa0318421f7ebdcc43b78239a9a52abb164eb218d0b3bd45e3a25df004c7a25cdf1c96872fc2af5790f372e7ffa286319c1cb260bed02fccef
-
SSDEEP
1536:Q0dqr86g7LWnICOqubrzocTzFJ0T72VpGT:J6dIVqgBTzFJ0T72aT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceuitig.exe -
Executes dropped EXE 1 IoCs
pid Process 1476 ceuitig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /m" ceuitig.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /n" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /v" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /e" ceuitig.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /o" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /q" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /i" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /w" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /c" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /t" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /y" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /u" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /f" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /g" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /x" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /d" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /k" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /a" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /b" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /j" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /h" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /l" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /s" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /s" d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /z" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /p" ceuitig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuitig = "C:\\Users\\Admin\\ceuitig.exe /r" ceuitig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe 1476 ceuitig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 1476 ceuitig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 1476 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 80 PID 872 wrote to memory of 1476 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 80 PID 872 wrote to memory of 1476 872 d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe"C:\Users\Admin\AppData\Local\Temp\d2780446747f193948833597b296accd2f5ba6032a91da382fb8507fe7859836.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\ceuitig.exe"C:\Users\Admin\ceuitig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1476
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD534ca74098e239969e09e7873457f9a62
SHA1062033aca4abc5f867d96868bf24181d8af106ac
SHA2568a8558e77ca6a92d7c5027b479933fb5a7fb6f8ca8b3e635427e2c17ea5cd177
SHA51297db2273acc8f4a65733d2f217d4d3db51ed1432f85533222624d7b93377ffb879d6e24bd17cb8c39519c19d3287a5825b9fb83668d468e1b336403a445a626e
-
Filesize
80KB
MD534ca74098e239969e09e7873457f9a62
SHA1062033aca4abc5f867d96868bf24181d8af106ac
SHA2568a8558e77ca6a92d7c5027b479933fb5a7fb6f8ca8b3e635427e2c17ea5cd177
SHA51297db2273acc8f4a65733d2f217d4d3db51ed1432f85533222624d7b93377ffb879d6e24bd17cb8c39519c19d3287a5825b9fb83668d468e1b336403a445a626e