Analysis

  • max time kernel
    150s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-01-2021 17:55

General

  • Target

    tracking details.exe

  • Size

    752KB

  • MD5

    3c35fca6cb231d20cc04e6d8b2601010

  • SHA1

    aecde409a20bdaa63be0570d5625938e7df50197

  • SHA256

    e6cd47abf6c7c73449bd05329a0e30a48012c947d8762dd2429333af8d7bc198

  • SHA512

    0b7e2604adf2d89ef471336f8dd322c9f8b222e404aa68fbf67a13ced6ec0eb0a8c9968cb92401b44d2d4d1a1e53e51e7d8840f74ee4baec3f1d4b05d76d1d77

Malware Config

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Kutaki Executable 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tracking details.exe
    "C:\Users\Admin\AppData\Local\Temp\tracking details.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:3984
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syilizch.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syilizch.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:504

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syilizch.exe
      MD5

      3c35fca6cb231d20cc04e6d8b2601010

      SHA1

      aecde409a20bdaa63be0570d5625938e7df50197

      SHA256

      e6cd47abf6c7c73449bd05329a0e30a48012c947d8762dd2429333af8d7bc198

      SHA512

      0b7e2604adf2d89ef471336f8dd322c9f8b222e404aa68fbf67a13ced6ec0eb0a8c9968cb92401b44d2d4d1a1e53e51e7d8840f74ee4baec3f1d4b05d76d1d77

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\syilizch.exe
      MD5

      3c35fca6cb231d20cc04e6d8b2601010

      SHA1

      aecde409a20bdaa63be0570d5625938e7df50197

      SHA256

      e6cd47abf6c7c73449bd05329a0e30a48012c947d8762dd2429333af8d7bc198

      SHA512

      0b7e2604adf2d89ef471336f8dd322c9f8b222e404aa68fbf67a13ced6ec0eb0a8c9968cb92401b44d2d4d1a1e53e51e7d8840f74ee4baec3f1d4b05d76d1d77

    • memory/504-5-0x0000000000000000-mapping.dmp
    • memory/3984-4-0x0000000000000000-mapping.dmp