Analysis
-
max time kernel
253s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16/06/2022, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220414-en
General
-
Target
Tax Payment Challan.exe
-
Size
3.7MB
-
MD5
5f25cb32cb11c4e4983d85bf95aee8f1
-
SHA1
cd7ec29d9a162ac4ffd453c2beafae52767a3739
-
SHA256
99229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
-
SHA512
bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x001900000001db43-135.dat family_kutaki behavioral2/files/0x001900000001db43-136.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4676 gqqpnkch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gqqpnkch.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gqqpnkch.exe Tax Payment Challan.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3928 mspaint.exe 3928 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2116 Tax Payment Challan.exe 2116 Tax Payment Challan.exe 2116 Tax Payment Challan.exe 3928 mspaint.exe 3928 mspaint.exe 3928 mspaint.exe 3928 mspaint.exe 4676 gqqpnkch.exe 4676 gqqpnkch.exe 4676 gqqpnkch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3652 2116 Tax Payment Challan.exe 82 PID 2116 wrote to memory of 3652 2116 Tax Payment Challan.exe 82 PID 2116 wrote to memory of 3652 2116 Tax Payment Challan.exe 82 PID 3652 wrote to memory of 3928 3652 cmd.exe 84 PID 3652 wrote to memory of 3928 3652 cmd.exe 84 PID 3652 wrote to memory of 3928 3652 cmd.exe 84 PID 2116 wrote to memory of 4676 2116 Tax Payment Challan.exe 89 PID 2116 wrote to memory of 4676 2116 Tax Payment Challan.exe 89 PID 2116 wrote to memory of 4676 2116 Tax Payment Challan.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3928
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gqqpnkch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gqqpnkch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD55f25cb32cb11c4e4983d85bf95aee8f1
SHA1cd7ec29d9a162ac4ffd453c2beafae52767a3739
SHA25699229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
SHA512bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987
-
Filesize
3.7MB
MD55f25cb32cb11c4e4983d85bf95aee8f1
SHA1cd7ec29d9a162ac4ffd453c2beafae52767a3739
SHA25699229a496b7b21bc5385bf85b68358418a5e3554740fa8ed14d355c5bc25997d
SHA512bd528327be04e93c074175cf415fdb75811d951eaf4fb752c1bc56cd843292ae8c10357a6b66745179d5007ad31867e83aeaa82b61f6165090e368a0c9332987