Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
TDS Challan.exe
Resource
win7-20220414-en
General
-
Target
TDS Challan.exe
-
Size
496KB
-
MD5
9ca01142589187736ef32d73d28973e0
-
SHA1
307faa96f8186c56e8f670860190e08129d43b5b
-
SHA256
ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
-
SHA512
9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000d000000005ba9-58.dat family_kutaki behavioral1/files/0x000d000000005ba9-59.dat family_kutaki behavioral1/files/0x000d000000005ba9-61.dat family_kutaki behavioral1/files/0x000d000000005ba9-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 864 feqouwch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\feqouwch.exe TDS Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\feqouwch.exe TDS Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 TDS Challan.exe 2028 TDS Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum feqouwch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 feqouwch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main feqouwch.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2028 TDS Challan.exe 2028 TDS Challan.exe 2028 TDS Challan.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe 864 feqouwch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1260 2028 TDS Challan.exe 28 PID 2028 wrote to memory of 1260 2028 TDS Challan.exe 28 PID 2028 wrote to memory of 1260 2028 TDS Challan.exe 28 PID 2028 wrote to memory of 1260 2028 TDS Challan.exe 28 PID 2028 wrote to memory of 864 2028 TDS Challan.exe 30 PID 2028 wrote to memory of 864 2028 TDS Challan.exe 30 PID 2028 wrote to memory of 864 2028 TDS Challan.exe 30 PID 2028 wrote to memory of 864 2028 TDS Challan.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1260
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\feqouwch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\feqouwch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de