Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
Resource
win10v2004-20220812-en
General
-
Target
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe
-
Size
292KB
-
MD5
a28be5d5de12ab68efb32540b245c820
-
SHA1
213c7423cbf1d8127fce79e10cc5af2683e508e1
-
SHA256
5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5
-
SHA512
aaf98f2cd65c1f51a85b6937e75897446c2f0552da34de128058a9ac9e1bfc13372bc5e4c331dde86c9475f7776c60bac635901b28721452fa9f259c89ef7218
-
SSDEEP
6144:4aczAnqtrZjQCBBvfmge2uXOyDDaX66UEbuGHAceNEFKLrLRKD7ucfnxh4B7yCJe:4a3nqttp9K5CooEeOnio
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiauk.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 qiauk.exe -
Loads dropped DLL 2 IoCs
pid Process 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /j" 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /b" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /q" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /f" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /i" qiauk.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /r" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /o" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /m" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /l" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /n" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /j" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /z" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /g" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /v" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /c" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /h" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /a" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /t" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /d" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /u" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /y" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /e" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /s" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /x" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /w" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /k" qiauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiauk = "C:\\Users\\Admin\\qiauk.exe /p" qiauk.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe 1728 qiauk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 1728 qiauk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 1728 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 28 PID 832 wrote to memory of 1728 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 28 PID 832 wrote to memory of 1728 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 28 PID 832 wrote to memory of 1728 832 5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe"C:\Users\Admin\AppData\Local\Temp\5361033e4924b63d040dba78e81eff9cdfdfc59343b3ad4e1f7da7cc23900ca5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\qiauk.exe"C:\Users\Admin\qiauk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5b65f74464c575c8122877da9a7e380ee
SHA1ced87d13ea8ba167d10622b120ba44d1881aaca2
SHA2566fc3473bf77ad8436b8ed339f359440bf5d465ab37546aee637cea234cfdd908
SHA512691cc653d7f718ebfc5a6ec0a5842553a373101b18d02c7bcb3a6c576bf552fd09da821575d753c5960dc303937affd78254a471787f202e163642afd9b60e73
-
Filesize
292KB
MD5b65f74464c575c8122877da9a7e380ee
SHA1ced87d13ea8ba167d10622b120ba44d1881aaca2
SHA2566fc3473bf77ad8436b8ed339f359440bf5d465ab37546aee637cea234cfdd908
SHA512691cc653d7f718ebfc5a6ec0a5842553a373101b18d02c7bcb3a6c576bf552fd09da821575d753c5960dc303937affd78254a471787f202e163642afd9b60e73
-
Filesize
292KB
MD5b65f74464c575c8122877da9a7e380ee
SHA1ced87d13ea8ba167d10622b120ba44d1881aaca2
SHA2566fc3473bf77ad8436b8ed339f359440bf5d465ab37546aee637cea234cfdd908
SHA512691cc653d7f718ebfc5a6ec0a5842553a373101b18d02c7bcb3a6c576bf552fd09da821575d753c5960dc303937affd78254a471787f202e163642afd9b60e73
-
Filesize
292KB
MD5b65f74464c575c8122877da9a7e380ee
SHA1ced87d13ea8ba167d10622b120ba44d1881aaca2
SHA2566fc3473bf77ad8436b8ed339f359440bf5d465ab37546aee637cea234cfdd908
SHA512691cc653d7f718ebfc5a6ec0a5842553a373101b18d02c7bcb3a6c576bf552fd09da821575d753c5960dc303937affd78254a471787f202e163642afd9b60e73