Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:36
Static task
static1
Behavioral task
behavioral1
Sample
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe
Resource
win10v2004-20220901-en
General
-
Target
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe
-
Size
44KB
-
MD5
fbea056bcb2f77165de6c6f9e8dfe1b9
-
SHA1
385d3986111e386a32e7d34582f34248350bebb2
-
SHA256
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c
-
SHA512
49fbba188ff590fa8507754948396adae440a576d39d8cc63b9b75b9de9f189c31905b8b9df0aade92cf25901f8d65dfda2a54145532c84246fa1c07e465faba
-
SSDEEP
768:fAvCfsktlq2lms72owT9lMTx4IDEL8fJhEKrSauzSxX7d:fxfsL25ZCCHoLyFSauk7d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Wkowkyw.exepid process 2436 Wkowkyw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Iwyaoe kgwqyyqi = "C:\\Program Files (x86)\\Microsoft Ihuhuk\\Wkowkyw.exe" 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe -
Drops file in Program Files directory 2 IoCs
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exedescription ioc process File created C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exe 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe File opened for modification C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exe 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exepid process 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exedescription pid process target process PID 4980 wrote to memory of 2436 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe Wkowkyw.exe PID 4980 wrote to memory of 2436 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe Wkowkyw.exe PID 4980 wrote to memory of 2436 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe Wkowkyw.exe PID 4980 wrote to memory of 3484 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe WScript.exe PID 4980 wrote to memory of 3484 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe WScript.exe PID 4980 wrote to memory of 3484 4980 4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe"C:\Users\Admin\AppData\Local\Temp\4ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exe"C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\6824.vbs"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\6824.vbsFilesize
500B
MD508fc1264a95b4d5bf911f426f04be3cb
SHA1680b4145bddf5fd5ae20abccafae6e9262fef937
SHA2560e000912e4603bd9f822d0dfc707021823887b12f3574d2f19bdbdaf886aa97c
SHA512be57c3709e9ba56657f41188553008a1bae70b1dbfb12ed1fa3b002db7ecf33a2fab15ca5486728e477e6455a7136bcc3c05e27746490419346595489b588713
-
C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exeFilesize
44KB
MD5fbea056bcb2f77165de6c6f9e8dfe1b9
SHA1385d3986111e386a32e7d34582f34248350bebb2
SHA2564ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c
SHA51249fbba188ff590fa8507754948396adae440a576d39d8cc63b9b75b9de9f189c31905b8b9df0aade92cf25901f8d65dfda2a54145532c84246fa1c07e465faba
-
C:\Program Files (x86)\Microsoft Ihuhuk\Wkowkyw.exeFilesize
44KB
MD5fbea056bcb2f77165de6c6f9e8dfe1b9
SHA1385d3986111e386a32e7d34582f34248350bebb2
SHA2564ca13329fc435a35f52c5538081d13096d201b2f120626fc324241f09659722c
SHA51249fbba188ff590fa8507754948396adae440a576d39d8cc63b9b75b9de9f189c31905b8b9df0aade92cf25901f8d65dfda2a54145532c84246fa1c07e465faba
-
memory/2436-132-0x0000000000000000-mapping.dmp
-
memory/3484-135-0x0000000000000000-mapping.dmp