Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe
Resource
win7-20220414-en
General
-
Target
ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe
-
Size
496KB
-
MD5
9ca01142589187736ef32d73d28973e0
-
SHA1
307faa96f8186c56e8f670860190e08129d43b5b
-
SHA256
ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
-
SHA512
9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a000000003c9f-58.dat family_kutaki behavioral1/files/0x000a000000003c9f-61.dat family_kutaki behavioral1/files/0x000a000000003c9f-59.dat family_kutaki behavioral1/files/0x000a000000003c9f-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 828 erargxch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\erargxch.exe ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\erargxch.exe ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum erargxch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 erargxch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main erargxch.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe 828 erargxch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1652 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 29 PID 1444 wrote to memory of 1652 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 29 PID 1444 wrote to memory of 1652 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 29 PID 1444 wrote to memory of 1652 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 29 PID 1444 wrote to memory of 828 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 31 PID 1444 wrote to memory of 828 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 31 PID 1444 wrote to memory of 828 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 31 PID 1444 wrote to memory of 828 1444 ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe"C:\Users\Admin\AppData\Local\Temp\ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1652
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\erargxch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\erargxch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de