Analysis
-
max time kernel
72s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01/07/2022, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe
Resource
win7-20220414-en
General
-
Target
3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe
-
Size
568KB
-
MD5
609b31697442f224deb7fcd4170e8fd3
-
SHA1
11aed89fd1a0141fcc4626c1411239e5afe6ee8c
-
SHA256
3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd
-
SHA512
aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a000000003c9f-58.dat family_kutaki behavioral1/files/0x000a000000003c9f-61.dat family_kutaki behavioral1/files/0x000a000000003c9f-59.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1752 pqnarbch.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pqnarbch.exe 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pqnarbch.exe 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum pqnarbch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 pqnarbch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe 1752 pqnarbch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 112 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 29 PID 1628 wrote to memory of 112 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 29 PID 1628 wrote to memory of 112 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 29 PID 1628 wrote to memory of 112 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 29 PID 1628 wrote to memory of 1752 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 31 PID 1628 wrote to memory of 1752 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 31 PID 1628 wrote to memory of 1752 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 31 PID 1628 wrote to memory of 1752 1628 3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe"C:\Users\Admin\AppData\Local\Temp\3e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:112
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pqnarbch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pqnarbch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568KB
MD5609b31697442f224deb7fcd4170e8fd3
SHA111aed89fd1a0141fcc4626c1411239e5afe6ee8c
SHA2563e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd
SHA512aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c
-
Filesize
568KB
MD5609b31697442f224deb7fcd4170e8fd3
SHA111aed89fd1a0141fcc4626c1411239e5afe6ee8c
SHA2563e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd
SHA512aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c
-
Filesize
568KB
MD5609b31697442f224deb7fcd4170e8fd3
SHA111aed89fd1a0141fcc4626c1411239e5afe6ee8c
SHA2563e6593faa630ec2c87ff8406f08264bb055982363400fddeaca502b0019ce6fd
SHA512aeb9d03cc8feab950ddb36ffab3e68a2eab9fd31ab4da01236ee8e539d4078ac92d28ef7245a346a331324cd3aea20f3f18322f8371153ca93ac4b5c94aa724c