Analysis
-
max time kernel
125s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03/07/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
TDS Challan.exe
Resource
win7-20220414-en
General
-
Target
TDS Challan.exe
-
Size
740KB
-
MD5
1ba628a1b76f3a2f4133f94c7c18f91c
-
SHA1
876664b10a1fc68dba94efbb6aaa9f8eae3d1fac
-
SHA256
408e62f6612f1ace5d52c48c850a16881504dd50dd3af9bfc245bae8cb7cfeb0
-
SHA512
219a3a6e8cea16a58b90d7e2a044c4e7e26145e7e33c5a73033e382b2ccd8f8e16767af8af22f7f1db973733619a03e5cce1a4c2327f2d8f79db67f534f67e24
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000c00000000549e-58.dat family_kutaki behavioral1/files/0x000c00000000549e-59.dat family_kutaki behavioral1/files/0x000c00000000549e-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1036 kwtrutch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwtrutch.exe TDS Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwtrutch.exe TDS Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 632 TDS Challan.exe 632 TDS Challan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 632 TDS Challan.exe 632 TDS Challan.exe 632 TDS Challan.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe 1036 kwtrutch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 632 wrote to memory of 992 632 TDS Challan.exe 27 PID 632 wrote to memory of 992 632 TDS Challan.exe 27 PID 632 wrote to memory of 992 632 TDS Challan.exe 27 PID 632 wrote to memory of 992 632 TDS Challan.exe 27 PID 632 wrote to memory of 1036 632 TDS Challan.exe 29 PID 632 wrote to memory of 1036 632 TDS Challan.exe 29 PID 632 wrote to memory of 1036 632 TDS Challan.exe 29 PID 632 wrote to memory of 1036 632 TDS Challan.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:992
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwtrutch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwtrutch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740KB
MD51ba628a1b76f3a2f4133f94c7c18f91c
SHA1876664b10a1fc68dba94efbb6aaa9f8eae3d1fac
SHA256408e62f6612f1ace5d52c48c850a16881504dd50dd3af9bfc245bae8cb7cfeb0
SHA512219a3a6e8cea16a58b90d7e2a044c4e7e26145e7e33c5a73033e382b2ccd8f8e16767af8af22f7f1db973733619a03e5cce1a4c2327f2d8f79db67f534f67e24
-
Filesize
740KB
MD51ba628a1b76f3a2f4133f94c7c18f91c
SHA1876664b10a1fc68dba94efbb6aaa9f8eae3d1fac
SHA256408e62f6612f1ace5d52c48c850a16881504dd50dd3af9bfc245bae8cb7cfeb0
SHA512219a3a6e8cea16a58b90d7e2a044c4e7e26145e7e33c5a73033e382b2ccd8f8e16767af8af22f7f1db973733619a03e5cce1a4c2327f2d8f79db67f534f67e24
-
Filesize
740KB
MD51ba628a1b76f3a2f4133f94c7c18f91c
SHA1876664b10a1fc68dba94efbb6aaa9f8eae3d1fac
SHA256408e62f6612f1ace5d52c48c850a16881504dd50dd3af9bfc245bae8cb7cfeb0
SHA512219a3a6e8cea16a58b90d7e2a044c4e7e26145e7e33c5a73033e382b2ccd8f8e16767af8af22f7f1db973733619a03e5cce1a4c2327f2d8f79db67f534f67e24