Analysis
-
max time kernel
110s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30/05/2022, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe
Resource
win7-20220414-en
General
-
Target
07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe
-
Size
840KB
-
MD5
66bd57544cea67ce901427c1b81c78a0
-
SHA1
2d880248452407b682ca5514d07aa0899e12297f
-
SHA256
07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d
-
SHA512
42abd27e80a58e1134f61a17c7f7692a1c8a5130b1d16d9e23f41e8205f694aad93c89da64dd0d467c2821d653b5cb83942ecf20a033beacdb03ccf430ac528e
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0005000000004ed7-58.dat family_kutaki behavioral1/files/0x0005000000004ed7-59.dat family_kutaki behavioral1/files/0x0005000000004ed7-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1416 opxfjtch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opxfjtch.exe 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opxfjtch.exe 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum opxfjtch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 opxfjtch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe 1416 opxfjtch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1108 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 28 PID 2044 wrote to memory of 1108 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 28 PID 2044 wrote to memory of 1108 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 28 PID 2044 wrote to memory of 1108 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 28 PID 2044 wrote to memory of 1416 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 30 PID 2044 wrote to memory of 1416 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 30 PID 2044 wrote to memory of 1416 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 30 PID 2044 wrote to memory of 1416 2044 07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe"C:\Users\Admin\AppData\Local\Temp\07f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1108
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opxfjtch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opxfjtch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD566bd57544cea67ce901427c1b81c78a0
SHA12d880248452407b682ca5514d07aa0899e12297f
SHA25607f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d
SHA51242abd27e80a58e1134f61a17c7f7692a1c8a5130b1d16d9e23f41e8205f694aad93c89da64dd0d467c2821d653b5cb83942ecf20a033beacdb03ccf430ac528e
-
Filesize
840KB
MD566bd57544cea67ce901427c1b81c78a0
SHA12d880248452407b682ca5514d07aa0899e12297f
SHA25607f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d
SHA51242abd27e80a58e1134f61a17c7f7692a1c8a5130b1d16d9e23f41e8205f694aad93c89da64dd0d467c2821d653b5cb83942ecf20a033beacdb03ccf430ac528e
-
Filesize
840KB
MD566bd57544cea67ce901427c1b81c78a0
SHA12d880248452407b682ca5514d07aa0899e12297f
SHA25607f168a8d6006d5d188c90ec4b5bd19c438fe69d522ef5779c59a2b9fb0b167d
SHA51242abd27e80a58e1134f61a17c7f7692a1c8a5130b1d16d9e23f41e8205f694aad93c89da64dd0d467c2821d653b5cb83942ecf20a033beacdb03ccf430ac528e