Analysis
-
max time kernel
63s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27/05/2022, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe
Resource
win10v2004-20220414-en
General
-
Target
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe
-
Size
560KB
-
MD5
f85699f0c3bca198228a5af7de67ecba
-
SHA1
56f4a24a398dae4e6e47d62832144673b3486f9f
-
SHA256
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
SHA512
b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0008000000014a93-59.dat family_kutaki behavioral1/files/0x0008000000014a93-60.dat family_kutaki behavioral1/files/0x0008000000014a93-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1952 vlikwech.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlikwech.exe 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlikwech.exe 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe -
Loads dropped DLL 2 IoCs
pid Process 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vlikwech.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vlikwech.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe 1952 vlikwech.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1716 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 29 PID 1664 wrote to memory of 1716 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 29 PID 1664 wrote to memory of 1716 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 29 PID 1664 wrote to memory of 1716 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 29 PID 1664 wrote to memory of 1952 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 31 PID 1664 wrote to memory of 1952 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 31 PID 1664 wrote to memory of 1952 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 31 PID 1664 wrote to memory of 1952 1664 4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe"C:\Users\Admin\AppData\Local\Temp\4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1716
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlikwech.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vlikwech.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560KB
MD5f85699f0c3bca198228a5af7de67ecba
SHA156f4a24a398dae4e6e47d62832144673b3486f9f
SHA2564c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
SHA512b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
-
Filesize
560KB
MD5f85699f0c3bca198228a5af7de67ecba
SHA156f4a24a398dae4e6e47d62832144673b3486f9f
SHA2564c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
SHA512b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
-
Filesize
560KB
MD5f85699f0c3bca198228a5af7de67ecba
SHA156f4a24a398dae4e6e47d62832144673b3486f9f
SHA2564c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
SHA512b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582