Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
Resource
win10v2004-20220901-en
General
-
Target
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
-
Size
92KB
-
MD5
eeaffff303205e86b039462110b6c098
-
SHA1
5834f33e06ed72a26230ae70554308c18b1c0e46
-
SHA256
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37
-
SHA512
9688ca795cdc99a387f9d48f5b61f47ab038cd1ce3c53784b730e31accda6b461fa3c4234a75d048ead125172971c427362f88ea92eecd160fc7c219219ef00b
-
SSDEEP
1536:QEtX4EVT8JNenyIGmvcTlfbfwFocTzFJ0T72VpXw:zXxYhTxiBTzFJ0T72zw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cieuv.exe -
Executes dropped EXE 1 IoCs
pid Process 820 cieuv.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /x" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /d" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /i" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /n" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /t" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /o" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /c" 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /y" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /g" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /w" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /s" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /z" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /p" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /j" cieuv.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /h" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /b" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /u" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /m" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /q" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /l" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /a" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /v" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /k" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /f" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /c" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /e" cieuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cieuv = "C:\\Users\\Admin\\cieuv.exe /r" cieuv.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cieuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe 820 cieuv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 820 cieuv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 820 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 27 PID 1380 wrote to memory of 820 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 27 PID 1380 wrote to memory of 820 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 27 PID 1380 wrote to memory of 820 1380 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe"C:\Users\Admin\AppData\Local\Temp\227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\cieuv.exe"C:\Users\Admin\cieuv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD535994319fbba60612243c10a651cfa0f
SHA1cae640e0440eab6cd776a87ebd44cd7cb3e4c074
SHA2565100af3c2ed546d8a1856b9b1add4cc535fb17aa4755fa867d33f0624b23460a
SHA512dfb8bac2b956804f43b97c384b0988d200423a9b58ccc7f7cd617984a4522863b728feae0401daea932b9269b3ffd32ac0424d0d003d920d0751f7a99bd12b18
-
Filesize
92KB
MD535994319fbba60612243c10a651cfa0f
SHA1cae640e0440eab6cd776a87ebd44cd7cb3e4c074
SHA2565100af3c2ed546d8a1856b9b1add4cc535fb17aa4755fa867d33f0624b23460a
SHA512dfb8bac2b956804f43b97c384b0988d200423a9b58ccc7f7cd617984a4522863b728feae0401daea932b9269b3ffd32ac0424d0d003d920d0751f7a99bd12b18
-
Filesize
92KB
MD535994319fbba60612243c10a651cfa0f
SHA1cae640e0440eab6cd776a87ebd44cd7cb3e4c074
SHA2565100af3c2ed546d8a1856b9b1add4cc535fb17aa4755fa867d33f0624b23460a
SHA512dfb8bac2b956804f43b97c384b0988d200423a9b58ccc7f7cd617984a4522863b728feae0401daea932b9269b3ffd32ac0424d0d003d920d0751f7a99bd12b18
-
Filesize
92KB
MD535994319fbba60612243c10a651cfa0f
SHA1cae640e0440eab6cd776a87ebd44cd7cb3e4c074
SHA2565100af3c2ed546d8a1856b9b1add4cc535fb17aa4755fa867d33f0624b23460a
SHA512dfb8bac2b956804f43b97c384b0988d200423a9b58ccc7f7cd617984a4522863b728feae0401daea932b9269b3ffd32ac0424d0d003d920d0751f7a99bd12b18