wusa.exe
- File Path:
C:\windows\system32\wusa.exe
- Description: Windows Update Standalone Installer
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | 8930570F7F76840334962EFC6C173438 |
SHA1 | 58C69D6FF2EC90977E42AE45C0F7E2A9E8C1E65E |
SHA256 | EE8C9A8E161047F68B9AC1E81592587C63BC218389430EACAC0A8CAC3380AB0A |
SHA384 | 95EDEE4F201C74B61E0371634912E504F9297A76FEF924BB683B3C107677741431C5899BBA87AD00A4410A4B9DE21F49 |
SHA512 | 44BE1B85D08C7D9EB6C0FB2EDBCBC531A37E48F35CF0AD7358DF9C1B0ADFA52E39C362B19E0BD40D08C313E6F0B1CB02D16F7797DF21266CA1D1F8629D4A5670 |
SSDEEP | 6144:preMHxM8Ww6hnFYa8rRoVJA3pxyN90vE:4MHxMxThnFYMVCHy90 |
Signature
- Status: The file C:\windows\system32\wusa.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
- Serial: ``
- Thumbprint: ``
- Issuer:
- Subject:
File Metadata
- Original Filename: wusa.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
- Product Version: 6.3.9600.16384
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of wusa.exe
being misused. While wusa.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_uac_bypass_ntfs_reparse_point.yml | description: Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36) |
DRL 1.0 |
sigma | proc_creation_win_uac_bypass_ntfs_reparse_point.yml | description: Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36) |
DRL 1.0 |
sigma | proc_creation_win_uac_bypass_ntfs_reparse_point.yml | CommandLine\|startswith: '"C:\Windows\system32\wusa.exe" /quiet C:\Users\' |
DRL 1.0 |
signature-base | apt_thrip.yar | $s5 = “wusa.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_thrip.yar | $s4 = “wusa.exe” fullword ascii | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.