Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
-
Size
53KB
-
MD5
5576b41ef97652d384a05521c3940630
-
SHA1
b63da298a7ad201beaab8812f97cdc7e884af58d
-
SHA256
3d1d844f18883245c98fbf9802762d9a3090912f774ba124b475c35edb46fba3
-
SHA512
2b7926474877d3cd295c9df5b345bcb51ebd8e979fc224f2483b718217d16ee096b9095010d880b0ba89c93b0052b71ceae11c5be9e0607e28ec306fc5904b6c
-
SSDEEP
1536:vNRg8r8QFghki7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:VghkiJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peiode.exe -
Executes dropped EXE 1 IoCs
pid Process 2896 peiode.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\peiode = "C:\\Users\\Admin\\peiode.exe" peiode.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe 2896 peiode.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 2896 peiode.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2896 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2896 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2896 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2896 1704 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 28 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27 PID 2896 wrote to memory of 1704 2896 peiode.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\peiode.exe"C:\Users\Admin\peiode.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD537233d622165ee565b1db67fe9297a0a
SHA1c04dcfbf3060ff64f41c32de4a34b1cbc8012f8b
SHA25681255ddd162a8cdb39e2f105071fd957477b97efee7907e68fb609f89690c860
SHA5124cc9310d55a5e43a0ae6727df8519af0d788490791c6f411304b6b21c3148ea62ad94caf548a668683e5b6c03b7625ec37ff1ee4dfb63c18a45f8746b18ede30