Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
Resource
win10v2004-20240704-en
General
-
Target
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
-
Size
53KB
-
MD5
e5fb0b9a31661d5fc7f811756506cf52
-
SHA1
abe8882e471bb0a60c2cb046b2cfb073b973c036
-
SHA256
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71
-
SHA512
56f1252a010af81c8de7d9d73ce4f16fae5211a68505c5df702accc7af2e0a8e61f0c4cbd2c7889bf04891f7ecb006a354657403d65c1f31adcf8b31f48b6fb8
-
SSDEEP
1536:vNBg8r8Q/QmxT7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:zQmZJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceilus.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 ceilus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceilus = "C:\\Users\\Admin\\ceilus.exe" ceilus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe 2052 ceilus.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4228 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 2052 ceilus.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 2052 4228 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 85 PID 4228 wrote to memory of 2052 4228 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 85 PID 4228 wrote to memory of 2052 4228 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 85 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81 PID 2052 wrote to memory of 4228 2052 ceilus.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe"C:\Users\Admin\AppData\Local\Temp\ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\ceilus.exe"C:\Users\Admin\ceilus.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD52b98cf5c4d38369985bf473c0adf608d
SHA1d3b927af6a360662ae142da41c278d37ba29d501
SHA256c1e54b44cb7718ff7fb2499ad32cbe9588ffff63a93184944b37a7ec41674f66
SHA51235c2df8924023de80605d79c2f276f08295c526c94c5a65d3e7a09f55d25f50d9a678de8186dcd667752b9abf0816cfc60ef9f63d3066a074c6e13e7232a5028