Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe
Resource
win10v2004-20221111-en
General
-
Target
5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe
-
Size
224KB
-
MD5
747c45153bcb833543b6671ef82bac55
-
SHA1
a1ca387a5dd6742060e2f6de16661a4ad1fad489
-
SHA256
5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32
-
SHA512
2a9bd6ab6e2a94ea84fa7bd53204a2b5dbe670f835421f10662e4e768aadfe9a20aeeef457246ee42d6df8d2c4ba457bf22fe616a05602493f6d4967baf7f1e2
-
SSDEEP
6144:l5zFwzWQdGh9zDBXgtXV8WS0ij/LdjthuWKnvmb7/D26f7zEUg7Aw1z14l:DFw0h9nBXgtF8WhIDdjthuWKnvmb7/D5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuoaku.exe -
Executes dropped EXE 1 IoCs
pid Process 432 wuoaku.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe -
Adds Run key to start application 2 TTPs 45 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /V" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /F" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /l" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /P" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /r" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /W" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /y" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /Y" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /X" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /p" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /i" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /s" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /k" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /b" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /B" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /H" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /Q" wuoaku.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /n" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /m" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /w" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /x" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /J" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /I" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /K" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /T" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /e" 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /M" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /g" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /L" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /R" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /j" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /A" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /o" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /v" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /N" wuoaku.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /G" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /a" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /O" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /D" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /d" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /q" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /e" wuoaku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuoaku = "C:\\Users\\Admin\\wuoaku.exe /U" wuoaku.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe 432 wuoaku.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 432 wuoaku.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 432 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 28 PID 1628 wrote to memory of 432 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 28 PID 1628 wrote to memory of 432 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 28 PID 1628 wrote to memory of 432 1628 5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe"C:\Users\Admin\AppData\Local\Temp\5f491a7267fadba4195f25397509b6509edf7a38217c11632b250ce96a2e2b32.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\wuoaku.exe"C:\Users\Admin\wuoaku.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b6c57a413daa263d746760cb72f10d86
SHA10bd499ed768961c47ec3fad515193d74e5f02db8
SHA2568cdde90ea3a0b2c4147196ba8b06dfccd9010026114f31f4d6a96f9e8d492bb5
SHA512cd0af4b9ef35ebe7e8099bdfadbcb205744c10304dc6e6960e21918ddffd297b21c9df874dc63ea5429e5514ae4078ff8a155d01dc72e7dfa56a759a4d96f4b2
-
Filesize
224KB
MD5b6c57a413daa263d746760cb72f10d86
SHA10bd499ed768961c47ec3fad515193d74e5f02db8
SHA2568cdde90ea3a0b2c4147196ba8b06dfccd9010026114f31f4d6a96f9e8d492bb5
SHA512cd0af4b9ef35ebe7e8099bdfadbcb205744c10304dc6e6960e21918ddffd297b21c9df874dc63ea5429e5514ae4078ff8a155d01dc72e7dfa56a759a4d96f4b2
-
Filesize
224KB
MD5b6c57a413daa263d746760cb72f10d86
SHA10bd499ed768961c47ec3fad515193d74e5f02db8
SHA2568cdde90ea3a0b2c4147196ba8b06dfccd9010026114f31f4d6a96f9e8d492bb5
SHA512cd0af4b9ef35ebe7e8099bdfadbcb205744c10304dc6e6960e21918ddffd297b21c9df874dc63ea5429e5514ae4078ff8a155d01dc72e7dfa56a759a4d96f4b2
-
Filesize
224KB
MD5b6c57a413daa263d746760cb72f10d86
SHA10bd499ed768961c47ec3fad515193d74e5f02db8
SHA2568cdde90ea3a0b2c4147196ba8b06dfccd9010026114f31f4d6a96f9e8d492bb5
SHA512cd0af4b9ef35ebe7e8099bdfadbcb205744c10304dc6e6960e21918ddffd297b21c9df874dc63ea5429e5514ae4078ff8a155d01dc72e7dfa56a759a4d96f4b2