Analysis

  • max time kernel
    4294183s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    29/03/2022, 20:00

General

  • Target

    a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe

  • Size

    884KB

  • MD5

    5d481b1a50c3d6477180f413f1b5597c

  • SHA1

    3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

  • SHA256

    a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

  • SHA512

    d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

Malware Config

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Kutaki Executable 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe
    "C:\Users\Admin\AppData\Local\Temp\a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:300
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe

      Filesize

      884KB

      MD5

      5d481b1a50c3d6477180f413f1b5597c

      SHA1

      3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

      SHA256

      a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

      SHA512

      d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe

      Filesize

      884KB

      MD5

      5d481b1a50c3d6477180f413f1b5597c

      SHA1

      3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

      SHA256

      a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

      SHA512

      d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbzxyrch.exe

      Filesize

      884KB

      MD5

      5d481b1a50c3d6477180f413f1b5597c

      SHA1

      3cb1c4f6622fbd6b591fd3f50fa18664c6d9d0ca

      SHA256

      a8a690b159d9ee37b5ef2a16800385d61581a8e4d21f0069cd492e919a868659

      SHA512

      d0ec083a97be0ce6fa33cf6dd3e424e1f939fded0dbaebed0f66c7871071cfc355c8da117726fd9328537595b6ca641f4dc7419baf7f105cf018a3deed5f1f0c

    • memory/1968-56-0x00000000767A1000-0x00000000767A3000-memory.dmp

      Filesize

      8KB