Analysis
-
max time kernel
148s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-07-2022 13:08
Static task
static1
Behavioral task
behavioral1
Sample
E-bill.exe
Resource
win7-20220414-en
General
-
Target
E-bill.exe
-
Size
968KB
-
MD5
e8f5b21f536286d5fb65297300f4b11f
-
SHA1
c21a5f1668385d581d5ddebdd9907be4c961383a
-
SHA256
e296a3f9af1ee967a9a919495e2a12917dd4077d794a54e25b9e16c02854a74e
-
SHA512
21d16e637bdb9849656f949e46b6f37ad1b3f5338555f514804467a30b75c4f6e574ac6058b7d1ec8235c57aa16b190acb532f3905cb2bbbb9f1ad6c4362df7b
Malware Config
Signatures
-
Kutaki Executable 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe family_kutaki -
Executes dropped EXE 1 IoCs
Processes:
xunvfrch.exepid process 1256 xunvfrch.exe -
Drops startup file 2 IoCs
Processes:
E-bill.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe E-bill.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe E-bill.exe -
Loads dropped DLL 2 IoCs
Processes:
E-bill.exepid process 1992 E-bill.exe 1992 E-bill.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
E-bill.exexunvfrch.exepid process 1992 E-bill.exe 1992 E-bill.exe 1992 E-bill.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe 1256 xunvfrch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
E-bill.exedescription pid process target process PID 1992 wrote to memory of 1240 1992 E-bill.exe cmd.exe PID 1992 wrote to memory of 1240 1992 E-bill.exe cmd.exe PID 1992 wrote to memory of 1240 1992 E-bill.exe cmd.exe PID 1992 wrote to memory of 1240 1992 E-bill.exe cmd.exe PID 1992 wrote to memory of 1256 1992 E-bill.exe xunvfrch.exe PID 1992 wrote to memory of 1256 1992 E-bill.exe xunvfrch.exe PID 1992 wrote to memory of 1256 1992 E-bill.exe xunvfrch.exe PID 1992 wrote to memory of 1256 1992 E-bill.exe xunvfrch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E-bill.exe"C:\Users\Admin\AppData\Local\Temp\E-bill.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1240
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xunvfrch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
968KB
MD5e8f5b21f536286d5fb65297300f4b11f
SHA1c21a5f1668385d581d5ddebdd9907be4c961383a
SHA256e296a3f9af1ee967a9a919495e2a12917dd4077d794a54e25b9e16c02854a74e
SHA51221d16e637bdb9849656f949e46b6f37ad1b3f5338555f514804467a30b75c4f6e574ac6058b7d1ec8235c57aa16b190acb532f3905cb2bbbb9f1ad6c4362df7b
-
Filesize
968KB
MD5e8f5b21f536286d5fb65297300f4b11f
SHA1c21a5f1668385d581d5ddebdd9907be4c961383a
SHA256e296a3f9af1ee967a9a919495e2a12917dd4077d794a54e25b9e16c02854a74e
SHA51221d16e637bdb9849656f949e46b6f37ad1b3f5338555f514804467a30b75c4f6e574ac6058b7d1ec8235c57aa16b190acb532f3905cb2bbbb9f1ad6c4362df7b
-
Filesize
968KB
MD5e8f5b21f536286d5fb65297300f4b11f
SHA1c21a5f1668385d581d5ddebdd9907be4c961383a
SHA256e296a3f9af1ee967a9a919495e2a12917dd4077d794a54e25b9e16c02854a74e
SHA51221d16e637bdb9849656f949e46b6f37ad1b3f5338555f514804467a30b75c4f6e574ac6058b7d1ec8235c57aa16b190acb532f3905cb2bbbb9f1ad6c4362df7b