Analysis
-
max time kernel
152s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe
Resource
win10v2004-20220812-en
General
-
Target
734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe
-
Size
224KB
-
MD5
5bf8eb21dbbd8e02fe593dd2021d4da0
-
SHA1
2b7897452d2edc9c06803cff05107648c8a0afe4
-
SHA256
734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5
-
SHA512
87e3a71a2973c7b843164975ec6b2a388591007d5b56356df348e3f2154842c9a894e66d9085c7e000a2d983e688fbbc42dcdafc583854200c379514c021d447
-
SSDEEP
3072:kro4sUW1bU4SmOLCxokVqBh91IrnXHTmchf8Yr7Br2C9fDcB/yX/4UkQp+V:kr9PhmOLm/4Bh91MnXHTmchfI/yX/4lr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuayao.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 wuayao.exe -
Loads dropped DLL 2 IoCs
pid Process 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /d" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /b" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /z" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /c" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /w" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /u" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /s" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /n" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /g" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /v" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /m" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /h" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /a" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /l" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /t" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /y" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /p" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /j" wuayao.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /o" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /e" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /x" wuayao.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /k" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /i" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /q" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /f" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /r" wuayao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuayao = "C:\\Users\\Admin\\wuayao.exe /i" 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe 1708 wuayao.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 1708 wuayao.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1708 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 28 PID 1912 wrote to memory of 1708 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 28 PID 1912 wrote to memory of 1708 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 28 PID 1912 wrote to memory of 1708 1912 734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe"C:\Users\Admin\AppData\Local\Temp\734298f0c5c72206d92372ab5b3cfe81765607cd5f5d8f111adcac81b4161ab5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\wuayao.exe"C:\Users\Admin\wuayao.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58aa03d8f920d468dece7ca933f4065fa
SHA1c55cd977ba53725cc2b25d7c4e7e5b322ca2bdef
SHA2567b2b3bc8edd49507832b40dbb5644a2a59b788edfe2b8fcb6a18400818b3e5ba
SHA512024c3444e029640a3833ffd562cedbd23aef7041500be339648e98089664757d3fb8b00d93352dc4f15d0f57f39d8f7d61d2b771b6355119ca5cd51eff0dad74
-
Filesize
224KB
MD58aa03d8f920d468dece7ca933f4065fa
SHA1c55cd977ba53725cc2b25d7c4e7e5b322ca2bdef
SHA2567b2b3bc8edd49507832b40dbb5644a2a59b788edfe2b8fcb6a18400818b3e5ba
SHA512024c3444e029640a3833ffd562cedbd23aef7041500be339648e98089664757d3fb8b00d93352dc4f15d0f57f39d8f7d61d2b771b6355119ca5cd51eff0dad74
-
Filesize
224KB
MD58aa03d8f920d468dece7ca933f4065fa
SHA1c55cd977ba53725cc2b25d7c4e7e5b322ca2bdef
SHA2567b2b3bc8edd49507832b40dbb5644a2a59b788edfe2b8fcb6a18400818b3e5ba
SHA512024c3444e029640a3833ffd562cedbd23aef7041500be339648e98089664757d3fb8b00d93352dc4f15d0f57f39d8f7d61d2b771b6355119ca5cd51eff0dad74
-
Filesize
224KB
MD58aa03d8f920d468dece7ca933f4065fa
SHA1c55cd977ba53725cc2b25d7c4e7e5b322ca2bdef
SHA2567b2b3bc8edd49507832b40dbb5644a2a59b788edfe2b8fcb6a18400818b3e5ba
SHA512024c3444e029640a3833ffd562cedbd23aef7041500be339648e98089664757d3fb8b00d93352dc4f15d0f57f39d8f7d61d2b771b6355119ca5cd51eff0dad74