Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe
Resource
win10v2004-20220812-en
General
-
Target
5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe
-
Size
204KB
-
MD5
6b138a1fcd416550da08b784ff7001ef
-
SHA1
5faed5b8cf1aab73f7f301ef1db7f4ec00ba0744
-
SHA256
5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a
-
SHA512
9ef1c3f0f775c5e31cee4266e3bcb82a63e3768e39013a9049a561a46225c5fa049006a4ef3abb0a23facd271c201a8e76e7f276e8a26f763fa4ced420d1c560
-
SSDEEP
3072:aChDLsNgqe3muDOqkVfbX936NDoZq4rvKT9GxM6VcnR:JDLsNg73muDOqkpbX937Zq4ryP6VcnR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuyam.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 wuyam.exe -
Loads dropped DLL 2 IoCs
pid Process 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /s" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /r" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /h" 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /m" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /k" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /e" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /j" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /i" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /h" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /i" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /v" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /b" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /u" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /b" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /k" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /a" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /c" wuyam.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /l" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /u" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /h" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /s" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /q" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /p" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /m" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /q" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /g" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /y" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /g" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /t" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /f" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /l" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /x" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /d" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /f" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /z" wuyam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /p" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /z" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /e" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /t" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /w" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /o" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /n" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /r" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /w" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /j" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /n" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /a" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /y" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /c" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /s" 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /x" wuyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /o" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /v" wuyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuyam = "C:\\Users\\Admin\\wuyam.exe /d" wuyam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe 1864 wuyam.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 wuyam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 1864 wuyam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1864 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 27 PID 1692 wrote to memory of 1864 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 27 PID 1692 wrote to memory of 1864 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 27 PID 1692 wrote to memory of 1864 1692 5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe"C:\Users\Admin\AppData\Local\Temp\5744ad367bf23003bdeaecc48f0b6aa430e1aad4f0475efaa14e462fb5dbd60a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\wuyam.exe"C:\Users\Admin\wuyam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5b9973731818bcdbf9d4c00c7bf1bd60f
SHA1d30b2ea241ae32ca967da1e760fc6da1597dab35
SHA2567098020ab00eec0d01500097985af8cbc0681cbc9ccb085c70230322c837b229
SHA512bd0a2576433962e290765ccc4172262ce17879ad0dbb6fd28711a50ede8aec98784cdbc91749aeb8cd8683b26eaa5d52669532eefaf59ac6999871c090220984
-
Filesize
204KB
MD5b9973731818bcdbf9d4c00c7bf1bd60f
SHA1d30b2ea241ae32ca967da1e760fc6da1597dab35
SHA2567098020ab00eec0d01500097985af8cbc0681cbc9ccb085c70230322c837b229
SHA512bd0a2576433962e290765ccc4172262ce17879ad0dbb6fd28711a50ede8aec98784cdbc91749aeb8cd8683b26eaa5d52669532eefaf59ac6999871c090220984
-
Filesize
204KB
MD5b9973731818bcdbf9d4c00c7bf1bd60f
SHA1d30b2ea241ae32ca967da1e760fc6da1597dab35
SHA2567098020ab00eec0d01500097985af8cbc0681cbc9ccb085c70230322c837b229
SHA512bd0a2576433962e290765ccc4172262ce17879ad0dbb6fd28711a50ede8aec98784cdbc91749aeb8cd8683b26eaa5d52669532eefaf59ac6999871c090220984
-
Filesize
204KB
MD5b9973731818bcdbf9d4c00c7bf1bd60f
SHA1d30b2ea241ae32ca967da1e760fc6da1597dab35
SHA2567098020ab00eec0d01500097985af8cbc0681cbc9ccb085c70230322c837b229
SHA512bd0a2576433962e290765ccc4172262ce17879ad0dbb6fd28711a50ede8aec98784cdbc91749aeb8cd8683b26eaa5d52669532eefaf59ac6999871c090220984