Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03/07/2022, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
IncomeTax_Payment_Receipt.exe
Resource
win7-20220414-en
General
-
Target
IncomeTax_Payment_Receipt.exe
-
Size
636KB
-
MD5
bc6618a7be87946f55d90ac92b47f0bc
-
SHA1
10da65cd3ba38618f83473ab6c09abaec80e8341
-
SHA256
9b301c6642a4184267f2c62cfd2b32b0766a1e82caf699136a575ba07d3c7307
-
SHA512
d8939bb5ade4e6abda0b67f591390521ac91078727b4231e5191a473454dd5e84e9a707e8af0376d24924e6c04d85889f74c2797489cd0e1b2e6c459cacfab0f
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000800000001da73-134.dat family_kutaki behavioral2/files/0x000800000001da73-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 792 sgrodtch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sgrodtch.exe IncomeTax_Payment_Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sgrodtch.exe IncomeTax_Payment_Receipt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 IncomeTax_Payment_Receipt.exe 2416 IncomeTax_Payment_Receipt.exe 2416 IncomeTax_Payment_Receipt.exe 792 sgrodtch.exe 792 sgrodtch.exe 792 sgrodtch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2324 2416 IncomeTax_Payment_Receipt.exe 77 PID 2416 wrote to memory of 2324 2416 IncomeTax_Payment_Receipt.exe 77 PID 2416 wrote to memory of 2324 2416 IncomeTax_Payment_Receipt.exe 77 PID 2416 wrote to memory of 792 2416 IncomeTax_Payment_Receipt.exe 81 PID 2416 wrote to memory of 792 2416 IncomeTax_Payment_Receipt.exe 81 PID 2416 wrote to memory of 792 2416 IncomeTax_Payment_Receipt.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\IncomeTax_Payment_Receipt.exe"C:\Users\Admin\AppData\Local\Temp\IncomeTax_Payment_Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2324
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sgrodtch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sgrodtch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5bc6618a7be87946f55d90ac92b47f0bc
SHA110da65cd3ba38618f83473ab6c09abaec80e8341
SHA2569b301c6642a4184267f2c62cfd2b32b0766a1e82caf699136a575ba07d3c7307
SHA512d8939bb5ade4e6abda0b67f591390521ac91078727b4231e5191a473454dd5e84e9a707e8af0376d24924e6c04d85889f74c2797489cd0e1b2e6c459cacfab0f
-
Filesize
636KB
MD5bc6618a7be87946f55d90ac92b47f0bc
SHA110da65cd3ba38618f83473ab6c09abaec80e8341
SHA2569b301c6642a4184267f2c62cfd2b32b0766a1e82caf699136a575ba07d3c7307
SHA512d8939bb5ade4e6abda0b67f591390521ac91078727b4231e5191a473454dd5e84e9a707e8af0376d24924e6c04d85889f74c2797489cd0e1b2e6c459cacfab0f