Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14/06/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe
Resource
win7-20220414-en
General
-
Target
8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe
-
Size
795KB
-
MD5
75ee2cab545b73dc3ffb4a51c188f413
-
SHA1
a13d169deb59c403ece2e7a53e6413064595ac86
-
SHA256
8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
-
SHA512
4e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x0009000000008527-58.dat family_kutaki behavioral1/files/0x0009000000008527-59.dat family_kutaki behavioral1/files/0x0009000000008527-61.dat family_kutaki behavioral1/files/0x0009000000008527-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1704 hyuder.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe -
Loads dropped DLL 2 IoCs
pid Process 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum hyuder.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 hyuder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main hyuder.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 1704 hyuder.exe 1704 hyuder.exe 1704 hyuder.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1352 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 28 PID 1884 wrote to memory of 1352 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 28 PID 1884 wrote to memory of 1352 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 28 PID 1884 wrote to memory of 1352 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 28 PID 1884 wrote to memory of 1704 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 30 PID 1884 wrote to memory of 1704 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 30 PID 1884 wrote to memory of 1704 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 30 PID 1884 wrote to memory of 1704 1884 8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe"C:\Users\Admin\AppData\Local\Temp\8ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1352
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4
-
Filesize
795KB
MD575ee2cab545b73dc3ffb4a51c188f413
SHA1a13d169deb59c403ece2e7a53e6413064595ac86
SHA2568ea0ce7a60ddf35b65a734e87ff8e1b35c4525105fbf37ba36c1096a8e1c8765
SHA5124e5d9d60df5e4a7bc4982484e99cd71bdd48c80cf8f40f8f9f7c98d15a646712fe31397f8bb1b43e247fbe785817b433ef39db4f2edcd8996c713908f62429a4