Analysis
-
max time kernel
119s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08/05/2022, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe
Resource
win7-20220414-en
General
-
Target
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe
-
Size
1.3MB
-
MD5
e184e10181e18e7a761530dccb296bd7
-
SHA1
852260f0776d884678ba949957f31a8da3edb71e
-
SHA256
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
-
SHA512
7bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000d000000005ba9-59.dat family_kutaki behavioral1/files/0x000d000000005ba9-60.dat family_kutaki behavioral1/files/0x000d000000005ba9-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1932 sswjtdch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sswjtdch.exe 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sswjtdch.exe 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe -
Loads dropped DLL 2 IoCs
pid Process 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe 1932 sswjtdch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1712 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 28 PID 1096 wrote to memory of 1712 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 28 PID 1096 wrote to memory of 1712 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 28 PID 1096 wrote to memory of 1712 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 28 PID 1096 wrote to memory of 1932 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 30 PID 1096 wrote to memory of 1932 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 30 PID 1096 wrote to memory of 1932 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 30 PID 1096 wrote to memory of 1932 1096 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe"C:\Users\Admin\AppData\Local\Temp\7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sswjtdch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sswjtdch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e184e10181e18e7a761530dccb296bd7
SHA1852260f0776d884678ba949957f31a8da3edb71e
SHA2567c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
SHA5127bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1
-
Filesize
1.3MB
MD5e184e10181e18e7a761530dccb296bd7
SHA1852260f0776d884678ba949957f31a8da3edb71e
SHA2567c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
SHA5127bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1
-
Filesize
1.3MB
MD5e184e10181e18e7a761530dccb296bd7
SHA1852260f0776d884678ba949957f31a8da3edb71e
SHA2567c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
SHA5127bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1