Analysis
-
max time kernel
184s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21/05/2022, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
image.exe
Resource
win7-20220414-en
General
-
Target
image.exe
-
Size
536KB
-
MD5
76430208466ca619a470ab10e9ce6848
-
SHA1
a7730a38f002dfe4e59a26ec2cc46fdc422e2708
-
SHA256
5bd645a7783a25d2caa48ee448ad1e47c00ae25e5a7fd9b304ad9422e9e79fd5
-
SHA512
cad3a9d15632488ad418e17472215199630910f9adeb5d076e7a38c95b8b8e06fbe8263b9a3e2853e84b18e3754fc58ffb01717e845ffdf48fecdb397e92c22b
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000a0000000006db-135.dat family_kutaki behavioral2/files/0x000a0000000006db-134.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4712 eppjldch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eppjldch.exe image.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eppjldch.exe image.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5116 image.exe 5116 image.exe 5116 image.exe 4712 eppjldch.exe 4712 eppjldch.exe 4712 eppjldch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4764 5116 image.exe 81 PID 5116 wrote to memory of 4764 5116 image.exe 81 PID 5116 wrote to memory of 4764 5116 image.exe 81 PID 5116 wrote to memory of 4712 5116 image.exe 83 PID 5116 wrote to memory of 4712 5116 image.exe 83 PID 5116 wrote to memory of 4712 5116 image.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\image.exe"C:\Users\Admin\AppData\Local\Temp\image.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4764
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eppjldch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eppjldch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD576430208466ca619a470ab10e9ce6848
SHA1a7730a38f002dfe4e59a26ec2cc46fdc422e2708
SHA2565bd645a7783a25d2caa48ee448ad1e47c00ae25e5a7fd9b304ad9422e9e79fd5
SHA512cad3a9d15632488ad418e17472215199630910f9adeb5d076e7a38c95b8b8e06fbe8263b9a3e2853e84b18e3754fc58ffb01717e845ffdf48fecdb397e92c22b
-
Filesize
536KB
MD576430208466ca619a470ab10e9ce6848
SHA1a7730a38f002dfe4e59a26ec2cc46fdc422e2708
SHA2565bd645a7783a25d2caa48ee448ad1e47c00ae25e5a7fd9b304ad9422e9e79fd5
SHA512cad3a9d15632488ad418e17472215199630910f9adeb5d076e7a38c95b8b8e06fbe8263b9a3e2853e84b18e3754fc58ffb01717e845ffdf48fecdb397e92c22b