Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05/02/2022, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
Payment Invoice.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Payment Invoice.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
Payment Invoice.exe
-
Size
376KB
-
MD5
a7f37abc65de8b02ac67af17a289ad69
-
SHA1
6d271d0f377728657f4c284253cdc51faa3fdb5c
-
SHA256
7dfb08f5a669070d545d5e1e4d72c27b8c80d9c95820e441bbbacf1e9dd4aa31
-
SHA512
fec499c6dc1f5bbef6f36aa90cbbe35217633ebbafad5429af229a72909445273cecfb0c5b109bec680f54663d51d3b9fa4376c6926c56ef81112d32c8737f3b
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a000000012685-63.dat family_kutaki behavioral1/files/0x000a000000012685-65.dat family_kutaki behavioral1/files/0x000a000000012685-64.dat family_kutaki behavioral1/files/0x000a000000012685-70.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 672 gdonvdch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdonvdch.exe Payment Invoice.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdonvdch.exe Payment Invoice.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 Payment Invoice.exe 1192 Payment Invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main gdonvdch.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main Payment Invoice.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 Payment Invoice.exe 1192 Payment Invoice.exe 1192 Payment Invoice.exe 672 gdonvdch.exe 672 gdonvdch.exe 672 gdonvdch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1192 wrote to memory of 812 1192 Payment Invoice.exe 27 PID 1192 wrote to memory of 812 1192 Payment Invoice.exe 27 PID 1192 wrote to memory of 812 1192 Payment Invoice.exe 27 PID 1192 wrote to memory of 812 1192 Payment Invoice.exe 27 PID 1192 wrote to memory of 672 1192 Payment Invoice.exe 31 PID 1192 wrote to memory of 672 1192 Payment Invoice.exe 31 PID 1192 wrote to memory of 672 1192 Payment Invoice.exe 31 PID 1192 wrote to memory of 672 1192 Payment Invoice.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment Invoice.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:812
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdonvdch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdonvdch.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1944