Analysis
-
max time kernel
107s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28/05/2022, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe
Resource
win10v2004-20220414-en
General
-
Target
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe
-
Size
560KB
-
MD5
5f27bb40eb33d56669235b43214ed7b9
-
SHA1
9b9326e6771a1e5130c47664a984a8112ebf826c
-
SHA256
032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
-
SHA512
ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000c00000000549e-58.dat family_kutaki behavioral1/files/0x000c00000000549e-59.dat family_kutaki behavioral1/files/0x000c00000000549e-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1752 fepsudch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fepsudch.exe 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fepsudch.exe 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fepsudch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fepsudch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe 1752 fepsudch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2032 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 28 PID 1984 wrote to memory of 2032 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 28 PID 1984 wrote to memory of 2032 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 28 PID 1984 wrote to memory of 2032 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 28 PID 1984 wrote to memory of 1752 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 30 PID 1984 wrote to memory of 1752 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 30 PID 1984 wrote to memory of 1752 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 30 PID 1984 wrote to memory of 1752 1984 032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe"C:\Users\Admin\AppData\Local\Temp\032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fepsudch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fepsudch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560KB
MD55f27bb40eb33d56669235b43214ed7b9
SHA19b9326e6771a1e5130c47664a984a8112ebf826c
SHA256032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
SHA512ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f
-
Filesize
560KB
MD55f27bb40eb33d56669235b43214ed7b9
SHA19b9326e6771a1e5130c47664a984a8112ebf826c
SHA256032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
SHA512ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f
-
Filesize
560KB
MD55f27bb40eb33d56669235b43214ed7b9
SHA19b9326e6771a1e5130c47664a984a8112ebf826c
SHA256032f83f031fb5615cf82d5aae71e8cd20fe8efe741890aab85cf8856398b768e
SHA512ae49f24963e3b8dc093f6db313658659bbb73c805c91f0a271126b41146c19c3fe94be705c30614d9e996e55ba874536fe70badccc8a11aa04af9ee65b982d9f