Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3CareUEyes/...es.exe
windows7-x64
6CareUEyes/...es.exe
windows10-2004-x64
6CareUEyes/...le.exe
windows7-x64
7CareUEyes/...le.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Analysis
-
max time kernel
131s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
CareUEyes/App/CareUEyes/CareUEyes.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CareUEyes/App/CareUEyes/CareUEyes.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CareUEyes/CareUEyesPortable.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CareUEyes/CareUEyesPortable.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20241007-en
General
-
Target
CareUEyes/App/CareUEyes/CareUEyes.exe
-
Size
5.9MB
-
MD5
b0fcd926564bf3021ecaad98f6125d3e
-
SHA1
f4f68e4294bc86ddab3f3793624e0df0d00c98d4
-
SHA256
4585309f11e0ab5aca1b0c8d4f30652abb5ab5a9858f0b83ca271ef733d4b629
-
SHA512
4ecf001326ae736945a7bc7a625b34a323bd1a1878130143afc05009826e668e70c845526f229433ab38a76ce272d34224db06f7de2e02bb95c949c96c30f92d
-
SSDEEP
98304:dwqCvR1EYwlLAxscPPeL5UF0as1KygCZ0nK1TuBFgJs2zWTIgr:daR1I9AxsRRgW+gq2zWTIU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\CareUEyes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CareUEyes\\App\\CareUEyes\\CareUEyes.exe /tray" CareUEyes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CareUEyes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CareUEyes.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main CareUEyes.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch CareUEyes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" CareUEyes.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID CareUEyes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533}\uuid = "YzMwMmFkYTUzNDM2MjEwODRkMzI0M2M0Njc5ODNjNGU=" CareUEyes.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} CareUEyes.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} CareUEyes.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node CareUEyes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 CareUEyes.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2396 CareUEyes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 CareUEyes.exe 2352 CareUEyes.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2352 2396 CareUEyes.exe 31 PID 2396 wrote to memory of 2352 2396 CareUEyes.exe 31 PID 2396 wrote to memory of 2352 2396 CareUEyes.exe 31 PID 2396 wrote to memory of 2352 2396 CareUEyes.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe" /tj2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD501f8d2682361ee23bf4ee353a950c98a
SHA15da86783bbc1902eb5c18e3621977d1474042b3f
SHA25621956ec9d2eea5ebb6d897e93109306be4219b5a241765e4c3d55669df18a0dd
SHA5127ded4dda2331c6a840190363d77ee7fe4573b04b138a8296358afda22592deb4cc304c8793805c8ade870681844ab4356c5561b9eb3239e2b367405ab8d0461d
-
Filesize
2KB
MD5814b87d65a86bedb7af5332922b8fd49
SHA148f15574c962d13e634bc932b9c6945211430ecc
SHA256717b2a37b9b40adc0d881a129ffc2c340338f8a71f1b920c5a0a5fb3728e8b8c
SHA512ef0146b18032b3656072cc573326f265c00224ad076f7855978c62a4425c6674c0eef39d7da7ba080d7fdb2a6e26b82bbc8b0fa78ca7b120a7c3af9ce50146e3