Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
Resource
win10v2004-20220812-en
General
-
Target
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
-
Size
124KB
-
MD5
a09eb46856114a07dc7aad6d36b4cb10
-
SHA1
b048471389788cab01b80b9a103057f8b33fe268
-
SHA256
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7
-
SHA512
a405f492d46d8bc36669da26e671cc20d84a7744c2d0a51312bed5fd2f315bf548d9dc3d02ad587a5fb149f0932c4ca8ad1f838f94e8a32bec3199af207456c7
-
SSDEEP
1536:zztkjQTQ9U0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeRPNeG0h/y:1kj39U0GgAT9QIq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiaqai.exe -
Executes dropped EXE 1 IoCs
pid Process 4128 wiaqai.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /b" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /o" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /H" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /F" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /z" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /S" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /I" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /z" 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /g" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /m" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /J" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /R" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /W" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /X" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /Q" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /s" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /e" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /M" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /K" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /i" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /l" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /j" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /C" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /k" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /D" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /Y" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /f" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /h" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /v" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /y" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /n" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /t" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /d" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /V" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /U" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /p" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /T" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /P" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /w" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /Z" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /B" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /u" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /r" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /q" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /a" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /O" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /L" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /c" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /G" wiaqai.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /x" wiaqai.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /E" wiaqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiaqai = "C:\\Users\\Admin\\wiaqai.exe /N" wiaqai.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe 4128 wiaqai.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 4128 wiaqai.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4128 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 84 PID 1840 wrote to memory of 4128 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 84 PID 1840 wrote to memory of 4128 1840 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe"C:\Users\Admin\AppData\Local\Temp\72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\wiaqai.exe"C:\Users\Admin\wiaqai.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5d707c42e6af754962dd80dfe59cd649f
SHA15176707fc5cf4d08b21a4c51c32fbeacdb45fe5f
SHA256e4d9ff127586c012e061ce6a560cfe65cb6eeffb14b0587853fb0f5eebc6f43b
SHA5125bde7e5832b5f073f8089204f638e75b5bacd1ae39737ac7eca8f6cd5e630758a57c77c5830065dab1b4ea351e2d0ba9ae39cc5361e4e4a437844d6bd2d9e339
-
Filesize
124KB
MD5d707c42e6af754962dd80dfe59cd649f
SHA15176707fc5cf4d08b21a4c51c32fbeacdb45fe5f
SHA256e4d9ff127586c012e061ce6a560cfe65cb6eeffb14b0587853fb0f5eebc6f43b
SHA5125bde7e5832b5f073f8089204f638e75b5bacd1ae39737ac7eca8f6cd5e630758a57c77c5830065dab1b4ea351e2d0ba9ae39cc5361e4e4a437844d6bd2d9e339