Analysis
-
max time kernel
83s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21/05/2022, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
image.exe
Resource
win7-20220414-en
General
-
Target
image.exe
-
Size
536KB
-
MD5
9bcc23452d5a20790ff08c81812d7fd2
-
SHA1
9ad029bf6cebf0308db6771d423018289684faf5
-
SHA256
e33166cf9f69cdc54b3ca9721a6837d961ee42285c766561a9ff8a1719f39405
-
SHA512
89b39cc4b9bfef88cc99df3de3501a61f8e40a0becad0c5b2d83054db2414a723e25f85c638b22f98a3adcc3870952aa76d4dc1c66a61d13a2510dd147757606
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a000000003c9f-58.dat family_kutaki behavioral1/files/0x000a000000003c9f-59.dat family_kutaki behavioral1/files/0x000a000000003c9f-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1812 mmnsstch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mmnsstch.exe image.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mmnsstch.exe image.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 image.exe 1960 image.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1960 image.exe 1960 image.exe 1960 image.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe 1812 mmnsstch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1732 1960 image.exe 29 PID 1960 wrote to memory of 1732 1960 image.exe 29 PID 1960 wrote to memory of 1732 1960 image.exe 29 PID 1960 wrote to memory of 1732 1960 image.exe 29 PID 1960 wrote to memory of 1812 1960 image.exe 31 PID 1960 wrote to memory of 1812 1960 image.exe 31 PID 1960 wrote to memory of 1812 1960 image.exe 31 PID 1960 wrote to memory of 1812 1960 image.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\image.exe"C:\Users\Admin\AppData\Local\Temp\image.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1732
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mmnsstch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mmnsstch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD59bcc23452d5a20790ff08c81812d7fd2
SHA19ad029bf6cebf0308db6771d423018289684faf5
SHA256e33166cf9f69cdc54b3ca9721a6837d961ee42285c766561a9ff8a1719f39405
SHA51289b39cc4b9bfef88cc99df3de3501a61f8e40a0becad0c5b2d83054db2414a723e25f85c638b22f98a3adcc3870952aa76d4dc1c66a61d13a2510dd147757606
-
Filesize
536KB
MD59bcc23452d5a20790ff08c81812d7fd2
SHA19ad029bf6cebf0308db6771d423018289684faf5
SHA256e33166cf9f69cdc54b3ca9721a6837d961ee42285c766561a9ff8a1719f39405
SHA51289b39cc4b9bfef88cc99df3de3501a61f8e40a0becad0c5b2d83054db2414a723e25f85c638b22f98a3adcc3870952aa76d4dc1c66a61d13a2510dd147757606
-
Filesize
536KB
MD59bcc23452d5a20790ff08c81812d7fd2
SHA19ad029bf6cebf0308db6771d423018289684faf5
SHA256e33166cf9f69cdc54b3ca9721a6837d961ee42285c766561a9ff8a1719f39405
SHA51289b39cc4b9bfef88cc99df3de3501a61f8e40a0becad0c5b2d83054db2414a723e25f85c638b22f98a3adcc3870952aa76d4dc1c66a61d13a2510dd147757606