Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08/07/2022, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
TDS Challan.exe
Resource
win7-20220414-en
General
-
Target
TDS Challan.exe
-
Size
755KB
-
MD5
645be265d5378cdfdda8a059a228b9a2
-
SHA1
2d7816de252f0881583fce21ccd4ef2e9bfe1dff
-
SHA256
a09fd5ecf91fcdc892b38fb7fb356a972134863f8b639f307d01d688d2e3c050
-
SHA512
55ccb2dfdf6776550bda7b476bdaac6ba6dac2d97f215d57b0e164544befbabb8732006cc1d8920452553f38dc453f497266d12d184bee79bb2ce3f5c7702f7a
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a0000000139f8-58.dat family_kutaki behavioral1/files/0x000a0000000139f8-59.dat family_kutaki behavioral1/files/0x000a0000000139f8-61.dat family_kutaki behavioral1/files/0x000a0000000139f8-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1644 hyuder.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe TDS Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe TDS Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 TDS Challan.exe 2044 TDS Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum hyuder.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 hyuder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main hyuder.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 TDS Challan.exe 2044 TDS Challan.exe 2044 TDS Challan.exe 1644 hyuder.exe 1644 hyuder.exe 1644 hyuder.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1904 2044 TDS Challan.exe 27 PID 2044 wrote to memory of 1904 2044 TDS Challan.exe 27 PID 2044 wrote to memory of 1904 2044 TDS Challan.exe 27 PID 2044 wrote to memory of 1904 2044 TDS Challan.exe 27 PID 2044 wrote to memory of 1644 2044 TDS Challan.exe 29 PID 2044 wrote to memory of 1644 2044 TDS Challan.exe 29 PID 2044 wrote to memory of 1644 2044 TDS Challan.exe 29 PID 2044 wrote to memory of 1644 2044 TDS Challan.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1904
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD5645be265d5378cdfdda8a059a228b9a2
SHA12d7816de252f0881583fce21ccd4ef2e9bfe1dff
SHA256a09fd5ecf91fcdc892b38fb7fb356a972134863f8b639f307d01d688d2e3c050
SHA51255ccb2dfdf6776550bda7b476bdaac6ba6dac2d97f215d57b0e164544befbabb8732006cc1d8920452553f38dc453f497266d12d184bee79bb2ce3f5c7702f7a
-
Filesize
755KB
MD5645be265d5378cdfdda8a059a228b9a2
SHA12d7816de252f0881583fce21ccd4ef2e9bfe1dff
SHA256a09fd5ecf91fcdc892b38fb7fb356a972134863f8b639f307d01d688d2e3c050
SHA51255ccb2dfdf6776550bda7b476bdaac6ba6dac2d97f215d57b0e164544befbabb8732006cc1d8920452553f38dc453f497266d12d184bee79bb2ce3f5c7702f7a
-
Filesize
755KB
MD5645be265d5378cdfdda8a059a228b9a2
SHA12d7816de252f0881583fce21ccd4ef2e9bfe1dff
SHA256a09fd5ecf91fcdc892b38fb7fb356a972134863f8b639f307d01d688d2e3c050
SHA51255ccb2dfdf6776550bda7b476bdaac6ba6dac2d97f215d57b0e164544befbabb8732006cc1d8920452553f38dc453f497266d12d184bee79bb2ce3f5c7702f7a
-
Filesize
755KB
MD5645be265d5378cdfdda8a059a228b9a2
SHA12d7816de252f0881583fce21ccd4ef2e9bfe1dff
SHA256a09fd5ecf91fcdc892b38fb7fb356a972134863f8b639f307d01d688d2e3c050
SHA51255ccb2dfdf6776550bda7b476bdaac6ba6dac2d97f215d57b0e164544befbabb8732006cc1d8920452553f38dc453f497266d12d184bee79bb2ce3f5c7702f7a