Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe
Resource
win10v2004-20220812-en
General
-
Target
a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe
-
Size
192KB
-
MD5
6fe1623b60b92237c3a8af45e51fe3f0
-
SHA1
3cc285ac12319b54505a0f77472a6359c787d67c
-
SHA256
a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d
-
SHA512
be7432a1eab6d979713edff283bfd303e642c5549c312b08e903bd93a86741a8e5654cabb4c3ed183a63ce9f6aa5b4d6a3adb01886e6620a15a784af27ebf8c7
-
SSDEEP
3072:nebBbuoJUhfykwxvGah9cHhTiZemK/fObT/bGiU7dCyUHb9rXDdcN50X:eNXJUAfh9+hKK/fObT/bGiUJCyMrXDdv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cwkev.exe -
Executes dropped EXE 1 IoCs
pid Process 3704 cwkev.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /Q" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /q" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /r" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /d" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /y" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /A" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /K" cwkev.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /U" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /i" cwkev.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /b" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /t" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /F" a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /Y" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /k" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /L" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /H" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /e" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /z" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /E" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /I" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /T" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /F" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /v" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /s" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /P" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /c" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /R" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /j" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /D" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /a" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /S" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /V" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /x" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /o" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /g" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /N" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /p" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /f" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /W" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /w" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /O" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /M" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /m" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /J" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /n" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /Z" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /G" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /X" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /B" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /h" cwkev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cwkev = "C:\\Users\\Admin\\cwkev.exe /u" cwkev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe 3704 cwkev.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 3704 cwkev.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3704 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 85 PID 1384 wrote to memory of 3704 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 85 PID 1384 wrote to memory of 3704 1384 a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe"C:\Users\Admin\AppData\Local\Temp\a44af8c9c002fb85977e89026f61b6d34ba11c920bdb3caa59506057b2db367d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\cwkev.exe"C:\Users\Admin\cwkev.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5b6b190d8a879b480e05b27bb57b43439
SHA18e3387db733bec4a8cf7482da82b95ed738310fe
SHA256dc9b93c52cb8a3412e3770a2a07f49544f3520590da225762d67c343e7719d1e
SHA5125767eb2f3d5c0b2cdbf4d1fb527a818a7c1089cf65604d33bbd5e9bab9aecea4bdb4d66cb6ca15cc8672eaf1c952d79b010c314b3d7b3ae59babff605a9c400e
-
Filesize
192KB
MD5b6b190d8a879b480e05b27bb57b43439
SHA18e3387db733bec4a8cf7482da82b95ed738310fe
SHA256dc9b93c52cb8a3412e3770a2a07f49544f3520590da225762d67c343e7719d1e
SHA5125767eb2f3d5c0b2cdbf4d1fb527a818a7c1089cf65604d33bbd5e9bab9aecea4bdb4d66cb6ca15cc8672eaf1c952d79b010c314b3d7b3ae59babff605a9c400e