Analysis
-
max time kernel
151s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-04-2021 05:38
Static task
static1
Behavioral task
behavioral1
Sample
PRODUCT SAMPLE & ORDER SHEET.PDF.scr
Resource
win7v20210408
General
-
Target
PRODUCT SAMPLE & ORDER SHEET.PDF.scr
-
Size
488KB
-
MD5
85f51ff6bd810b0122a2c38eef70fa06
-
SHA1
aa49ffa7db0c118b644b62d75a0cc27b62a680aa
-
SHA256
6bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd
-
SHA512
e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe family_kutaki -
Executes dropped EXE 1 IoCs
Processes:
gndnlnch.exepid process 628 gndnlnch.exe -
Drops startup file 2 IoCs
Processes:
PRODUCT SAMPLE & ORDER SHEET.PDF.scrdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe PRODUCT SAMPLE & ORDER SHEET.PDF.scr File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe PRODUCT SAMPLE & ORDER SHEET.PDF.scr -
Loads dropped DLL 2 IoCs
Processes:
PRODUCT SAMPLE & ORDER SHEET.PDF.scrpid process 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
PRODUCT SAMPLE & ORDER SHEET.PDF.scrgndnlnch.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main PRODUCT SAMPLE & ORDER SHEET.PDF.scr Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main gndnlnch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1352 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
PRODUCT SAMPLE & ORDER SHEET.PDF.scrgndnlnch.exepid process 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr 628 gndnlnch.exe 628 gndnlnch.exe 628 gndnlnch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
PRODUCT SAMPLE & ORDER SHEET.PDF.scrdescription pid process target process PID 1736 wrote to memory of 1964 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr cmd.exe PID 1736 wrote to memory of 1964 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr cmd.exe PID 1736 wrote to memory of 1964 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr cmd.exe PID 1736 wrote to memory of 1964 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr cmd.exe PID 1736 wrote to memory of 628 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr gndnlnch.exe PID 1736 wrote to memory of 628 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr gndnlnch.exe PID 1736 wrote to memory of 628 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr gndnlnch.exe PID 1736 wrote to memory of 628 1736 PRODUCT SAMPLE & ORDER SHEET.PDF.scr gndnlnch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PRODUCT SAMPLE & ORDER SHEET.PDF.scr"C:\Users\Admin\AppData\Local\Temp\PRODUCT SAMPLE & ORDER SHEET.PDF.scr" /S1⤵
- Drops startup file
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\images.jpg2⤵PID:1964
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gndnlnch.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:628
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ba87f0b37df02b7c724c8d68ec05a7e4
SHA1e9b010344ba106a56a0036e9cf661f6021c397b6
SHA25608ff2712bc0f924da12d5eb3041a595db0f22be7375d55b3355b1c89bd97f148
SHA51275985210c6dece9898d3420e7db44105b0bd6f50832ab33d9f0aabc3de672db4be30b1091f9b5184054b9d568bde4aea73e2913b329b2471ddf485e7d75a05c9
-
MD5
85f51ff6bd810b0122a2c38eef70fa06
SHA1aa49ffa7db0c118b644b62d75a0cc27b62a680aa
SHA2566bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd
SHA512e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698
-
MD5
85f51ff6bd810b0122a2c38eef70fa06
SHA1aa49ffa7db0c118b644b62d75a0cc27b62a680aa
SHA2566bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd
SHA512e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698
-
MD5
85f51ff6bd810b0122a2c38eef70fa06
SHA1aa49ffa7db0c118b644b62d75a0cc27b62a680aa
SHA2566bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd
SHA512e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698
-
MD5
85f51ff6bd810b0122a2c38eef70fa06
SHA1aa49ffa7db0c118b644b62d75a0cc27b62a680aa
SHA2566bc635e6ac09b880a389ddf37ceaae81cb38fd81b3966ca1656b65c7d0f4d8fd
SHA512e20cc0744e2d3378958990e27ce59f25787f3133a67e4f0d21d63d7da1fc56ef9b2a297303f723a9408f24d3321931a45ecfcc70d6a19b954eab04602c3f4698