Analysis
-
max time kernel
186s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29/05/2022, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe
Resource
win7-20220414-en
General
-
Target
0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe
-
Size
499KB
-
MD5
ee9d608c58f615144948a76f0c271dda
-
SHA1
f95fcd18d45361e61b6947c4002e10b714b12127
-
SHA256
0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76
-
SHA512
32c45c057f1cdbf85085fb07cd490489acbf44d17dd6985141145807e441d8837c0be2650c664e1aaef39da968131435ebdf01446f064167ad42929f2d8dc503
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x00030000000006fd-134.dat family_kutaki behavioral2/files/0x00030000000006fd-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4252 lunlerio.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum lunlerio.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 lunlerio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 4252 lunlerio.exe 4252 lunlerio.exe 4252 lunlerio.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3016 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 80 PID 2896 wrote to memory of 3016 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 80 PID 2896 wrote to memory of 3016 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 80 PID 2896 wrote to memory of 4252 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 82 PID 2896 wrote to memory of 4252 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 82 PID 2896 wrote to memory of 4252 2896 0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe"C:\Users\Admin\AppData\Local\Temp\0d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:3016
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD5ee9d608c58f615144948a76f0c271dda
SHA1f95fcd18d45361e61b6947c4002e10b714b12127
SHA2560d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76
SHA51232c45c057f1cdbf85085fb07cd490489acbf44d17dd6985141145807e441d8837c0be2650c664e1aaef39da968131435ebdf01446f064167ad42929f2d8dc503
-
Filesize
499KB
MD5ee9d608c58f615144948a76f0c271dda
SHA1f95fcd18d45361e61b6947c4002e10b714b12127
SHA2560d3cf290f14c09e02aa3cea0c711e01955131d829cf7369b1f2dba351ba49d76
SHA51232c45c057f1cdbf85085fb07cd490489acbf44d17dd6985141145807e441d8837c0be2650c664e1aaef39da968131435ebdf01446f064167ad42929f2d8dc503