Analysis
-
max time kernel
4294183s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29/03/2022, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe
Resource
win7-20220311-en
General
-
Target
a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe
-
Size
884KB
-
MD5
5d481b1a50c3d6477180f413f1b5597c
-
SHA1
3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca
-
SHA256
a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659
-
SHA512
d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x00090000000122fd-58.dat family_kutaki behavioral1/files/0x00090000000122fd-61.dat family_kutaki behavioral1/files/0x00090000000122fd-59.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1732 fbzxyrch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe 1732 fbzxyrch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 300 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 28 PID 1968 wrote to memory of 300 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 28 PID 1968 wrote to memory of 300 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 28 PID 1968 wrote to memory of 300 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 28 PID 1968 wrote to memory of 1732 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 30 PID 1968 wrote to memory of 1732 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 30 PID 1968 wrote to memory of 1732 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 30 PID 1968 wrote to memory of 1732 1968 a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe"C:\Users\Admin\AppData\Local\Temp\a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:300
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884KB
MD55d481b1a50c3d6477180f413f1b5597c
SHA13cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca
SHA256a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659
SHA512d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c
-
Filesize
884KB
MD55d481b1a50c3d6477180f413f1b5597c
SHA13cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca
SHA256a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659
SHA512d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c
-
Filesize
884KB
MD55d481b1a50c3d6477180f413f1b5597c
SHA13cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca
SHA256a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659
SHA512d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c