Analysis
-
max time kernel
165s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08/05/2022, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe
Resource
win7-20220414-en
General
-
Target
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe
-
Size
1.3MB
-
MD5
e184e10181e18e7a761530dccb296bd7
-
SHA1
852260f0776d884678ba949957f31a8da3edb71e
-
SHA256
7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
-
SHA512
7bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000200000001e697-138.dat family_kutaki behavioral2/files/0x000200000001e697-139.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3416 fgzvtsch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fgzvtsch.exe 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fgzvtsch.exe 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 3416 fgzvtsch.exe 3416 fgzvtsch.exe 3416 fgzvtsch.exe 3416 fgzvtsch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2144 wrote to memory of 392 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 83 PID 2144 wrote to memory of 392 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 83 PID 2144 wrote to memory of 392 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 83 PID 2144 wrote to memory of 3416 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 88 PID 2144 wrote to memory of 3416 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 88 PID 2144 wrote to memory of 3416 2144 7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe"C:\Users\Admin\AppData\Local\Temp\7c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:392
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fgzvtsch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fgzvtsch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e184e10181e18e7a761530dccb296bd7
SHA1852260f0776d884678ba949957f31a8da3edb71e
SHA2567c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
SHA5127bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1
-
Filesize
1.3MB
MD5e184e10181e18e7a761530dccb296bd7
SHA1852260f0776d884678ba949957f31a8da3edb71e
SHA2567c1b70174d26b365555d457f7f564bd3bde4e66d84fd9b0d49b12fffa62daac6
SHA5127bb7e0c4857eda2782a4e8c2342a2d8dfd6b70df1900ae5443600ae379f7d20efb5100f9992a009d6c12be56054f4afd1d611d0d29574a163b396894612047c1