Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 07:14
Static task
static1
Behavioral task
behavioral1
Sample
Payment.exe
Resource
win7v20201028
General
-
Target
Payment.exe
-
Size
752KB
-
MD5
55cb3b1b1f6fcb56f0e8d26cb8a4b8f2
-
SHA1
ce7013abac9be7c9ad1b700e8a3c735b97392819
-
SHA256
8179d2c371934e7f748fdf033d96a3b527158348e87ec21f1576136ede5d2d17
-
SHA512
a7c8e2f47bada4a62dca21ce900ad71dcdcf61011873e494603970102e9fbcb0fc8365c437c1c5f3f1f946cd78a6fc2a243df641b75df72b85910f06b98890f2
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe family_kutaki -
Executes dropped EXE 1 IoCs
Processes:
uivnbkch.exepid process 1220 uivnbkch.exe -
Drops startup file 2 IoCs
Processes:
Payment.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe Payment.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe Payment.exe -
Loads dropped DLL 2 IoCs
Processes:
Payment.exepid process 788 Payment.exe 788 Payment.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1524 DllHost.exe -
Suspicious use of SetWindowsHookEx 1052 IoCs
Processes:
Payment.exeuivnbkch.exepid process 788 Payment.exe 788 Payment.exe 788 Payment.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe 1220 uivnbkch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Payment.exedescription pid process target process PID 788 wrote to memory of 1140 788 Payment.exe cmd.exe PID 788 wrote to memory of 1140 788 Payment.exe cmd.exe PID 788 wrote to memory of 1140 788 Payment.exe cmd.exe PID 788 wrote to memory of 1140 788 Payment.exe cmd.exe PID 788 wrote to memory of 1220 788 Payment.exe uivnbkch.exe PID 788 wrote to memory of 1220 788 Payment.exe uivnbkch.exe PID 788 wrote to memory of 1220 788 Payment.exe uivnbkch.exe PID 788 wrote to memory of 1220 788 Payment.exe uivnbkch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment.exe"C:\Users\Admin\AppData\Local\Temp\Payment.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\Receipt.bmp2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exeMD5
55cb3b1b1f6fcb56f0e8d26cb8a4b8f2
SHA1ce7013abac9be7c9ad1b700e8a3c735b97392819
SHA2568179d2c371934e7f748fdf033d96a3b527158348e87ec21f1576136ede5d2d17
SHA512a7c8e2f47bada4a62dca21ce900ad71dcdcf61011873e494603970102e9fbcb0fc8365c437c1c5f3f1f946cd78a6fc2a243df641b75df72b85910f06b98890f2
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exeMD5
55cb3b1b1f6fcb56f0e8d26cb8a4b8f2
SHA1ce7013abac9be7c9ad1b700e8a3c735b97392819
SHA2568179d2c371934e7f748fdf033d96a3b527158348e87ec21f1576136ede5d2d17
SHA512a7c8e2f47bada4a62dca21ce900ad71dcdcf61011873e494603970102e9fbcb0fc8365c437c1c5f3f1f946cd78a6fc2a243df641b75df72b85910f06b98890f2
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uivnbkch.exeMD5
55cb3b1b1f6fcb56f0e8d26cb8a4b8f2
SHA1ce7013abac9be7c9ad1b700e8a3c735b97392819
SHA2568179d2c371934e7f748fdf033d96a3b527158348e87ec21f1576136ede5d2d17
SHA512a7c8e2f47bada4a62dca21ce900ad71dcdcf61011873e494603970102e9fbcb0fc8365c437c1c5f3f1f946cd78a6fc2a243df641b75df72b85910f06b98890f2
-
memory/1140-4-0x0000000000000000-mapping.dmp
-
memory/1220-7-0x0000000000000000-mapping.dmp