Analysis
-
max time kernel
96s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
13-06-2022 10:26
Static task
static1
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220414-en
General
-
Target
Tax Payment Challan.exe
-
Size
3.7MB
-
MD5
5f25cb32cb11c4e4983d85bf95aee8f1
-
SHA1
cd7ec29d9a162ac4ffd453c2beafae52767a3739
-
SHA256
99229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
-
SHA512
bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001231b-59.dat family_kutaki behavioral1/files/0x000a00000001231b-60.dat family_kutaki behavioral1/files/0x000a00000001231b-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1708 ayfzsgch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayfzsgch.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayfzsgch.exe Tax Payment Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 Tax Payment Challan.exe 1452 Tax Payment Challan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1496 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1452 Tax Payment Challan.exe 1452 Tax Payment Challan.exe 1452 Tax Payment Challan.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe 1708 ayfzsgch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1452 wrote to memory of 744 1452 Tax Payment Challan.exe 29 PID 1452 wrote to memory of 744 1452 Tax Payment Challan.exe 29 PID 1452 wrote to memory of 744 1452 Tax Payment Challan.exe 29 PID 1452 wrote to memory of 744 1452 Tax Payment Challan.exe 29 PID 1452 wrote to memory of 1708 1452 Tax Payment Challan.exe 31 PID 1452 wrote to memory of 1708 1452 Tax Payment Challan.exe 31 PID 1452 wrote to memory of 1708 1452 Tax Payment Challan.exe 31 PID 1452 wrote to memory of 1708 1452 Tax Payment Challan.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:744
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayfzsgch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ayfzsgch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD55f25cb32cb11c4e4983d85bf95aee8f1
SHA1cd7ec29d9a162ac4ffd453c2beafae52767a3739
SHA25699229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
SHA512bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987
-
Filesize
3.7MB
MD55f25cb32cb11c4e4983d85bf95aee8f1
SHA1cd7ec29d9a162ac4ffd453c2beafae52767a3739
SHA25699229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
SHA512bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987
-
Filesize
3.7MB
MD55f25cb32cb11c4e4983d85bf95aee8f1
SHA1cd7ec29d9a162ac4ffd453c2beafae52767a3739
SHA25699229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
SHA512bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987