Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe
Resource
win10v2004-20240226-en
General
-
Target
041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe
-
Size
200KB
-
MD5
450575dbdac239897ee24490430760ab
-
SHA1
960362f92ecc2abcdfb8860db1dde435c5cd2b35
-
SHA256
041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97
-
SHA512
1fec2a4491b7b8b43d160d463bd6c3b3a838f83babc57c6ace3dd8a8cb7caa188e2f2ac362e69b401f659df3158c828e21b9089a7fa9e266bb8d54242d76bc9a
-
SSDEEP
1536:CUD/SiphHfuZAEVFZFe6AlKvfQ5sUQAMEY0/fMktO+:nn/EFt+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niuawil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe -
Executes dropped EXE 1 IoCs
pid Process 4860 niuawil.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /W" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /h" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /I" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /r" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /y" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /b" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /c" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /v" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /F" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /z" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /A" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /K" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /Q" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /O" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /R" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /G" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /S" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /D" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /j" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /s" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /w" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /n" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /N" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /E" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /t" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /u" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /Y" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /e" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /C" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /V" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /M" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /L" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /X" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /g" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /o" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /B" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /q" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /Z" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /P" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /a" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /H" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /i" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /k" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /f" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /l" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /d" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /J" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /T" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /m" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /p" niuawil.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niuawil = "C:\\Users\\Admin\\niuawil.exe /U" niuawil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe 4860 niuawil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3924 041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe 4860 niuawil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4860 3924 041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe 89 PID 3924 wrote to memory of 4860 3924 041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe 89 PID 3924 wrote to memory of 4860 3924 041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe 89 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84 PID 4860 wrote to memory of 3924 4860 niuawil.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe"C:\Users\Admin\AppData\Local\Temp\041a8be2a89d0d7823da7cb61910761e6051898ca47b348ed1906587faf94d97.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\niuawil.exe"C:\Users\Admin\niuawil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5c23062f6795cf891f2ec164be5852558
SHA1f517935a36486a2667d52f3dea741a6297c6f1c1
SHA256ea8cced38ce094402d3e5a4df223c05e960aa1dc2acd57ee6a7ed71fb9ef15ff
SHA5124aeb2ee0d1cef61cd321ee9f3db6237a4941b1dc123339b3ae11de475b29a198ff3f00786ecffcd681135b682614aa6f72d9590cb9c66b1fd68177643dca2de2