Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14/06/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220414-en
General
-
Target
Tax Payment Challan.exe
-
Size
795KB
-
MD5
75ee2cab545b73dc3ffb4a51c188f413
-
SHA1
a13d169deb59c403ece2e7a53e6413064595ac86
-
SHA256
8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
-
SHA512
4e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x0009000000008527-58.dat family_kutaki behavioral1/files/0x0009000000008527-59.dat family_kutaki behavioral1/files/0x0009000000008527-61.dat family_kutaki behavioral1/files/0x0009000000008527-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2020 hyuder.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe Tax Payment Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 Tax Payment Challan.exe 1908 Tax Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum hyuder.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 hyuder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main hyuder.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 Tax Payment Challan.exe 1908 Tax Payment Challan.exe 1908 Tax Payment Challan.exe 2020 hyuder.exe 2020 hyuder.exe 2020 hyuder.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2032 1908 Tax Payment Challan.exe 28 PID 1908 wrote to memory of 2032 1908 Tax Payment Challan.exe 28 PID 1908 wrote to memory of 2032 1908 Tax Payment Challan.exe 28 PID 1908 wrote to memory of 2032 1908 Tax Payment Challan.exe 28 PID 1908 wrote to memory of 2020 1908 Tax Payment Challan.exe 30 PID 1908 wrote to memory of 2020 1908 Tax Payment Challan.exe 30 PID 1908 wrote to memory of 2020 1908 Tax Payment Challan.exe 30 PID 1908 wrote to memory of 2020 1908 Tax Payment Challan.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4