Analysis
-
max time kernel
187s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09/06/2022, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
TDS Challan.exe
Resource
win7-20220414-en
General
-
Target
TDS Challan.exe
-
Size
496KB
-
MD5
9ca01142589187736ef32d73d28973e0
-
SHA1
307faa96f8186c56e8f670860190e08129d43b5b
-
SHA256
ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
-
SHA512
9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000800000001dabb-134.dat family_kutaki behavioral2/files/0x000800000001dabb-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2524 rogtdfch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rogtdfch.exe TDS Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rogtdfch.exe TDS Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rogtdfch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rogtdfch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 TDS Challan.exe 1860 TDS Challan.exe 1860 TDS Challan.exe 2524 rogtdfch.exe 2524 rogtdfch.exe 2524 rogtdfch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1860 wrote to memory of 668 1860 TDS Challan.exe 78 PID 1860 wrote to memory of 668 1860 TDS Challan.exe 78 PID 1860 wrote to memory of 668 1860 TDS Challan.exe 78 PID 1860 wrote to memory of 2524 1860 TDS Challan.exe 81 PID 1860 wrote to memory of 2524 1860 TDS Challan.exe 81 PID 1860 wrote to memory of 2524 1860 TDS Challan.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:668
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rogtdfch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rogtdfch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de
-
Filesize
496KB
MD59ca01142589187736ef32d73d28973e0
SHA1307faa96f8186c56e8f670860190e08129d43b5b
SHA256ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb
SHA5129ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de