Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/07/2022, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
TDS Payment Challan.exe
Resource
win7-20220414-en
General
-
Target
TDS Payment Challan.exe
-
Size
671KB
-
MD5
62aea7e47f647f9d6d2cdacb15e4b163
-
SHA1
884550e92ac4ad9c24f3473d889b9247775f5ee5
-
SHA256
73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
-
SHA512
59cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x00030000000006fd-134.dat family_kutaki behavioral2/files/0x00030000000006fd-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4884 lunlerio.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum lunlerio.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 lunlerio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3472 TDS Payment Challan.exe 3472 TDS Payment Challan.exe 3472 TDS Payment Challan.exe 4884 lunlerio.exe 4884 lunlerio.exe 4884 lunlerio.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2200 3472 TDS Payment Challan.exe 79 PID 3472 wrote to memory of 2200 3472 TDS Payment Challan.exe 79 PID 3472 wrote to memory of 2200 3472 TDS Payment Challan.exe 79 PID 3472 wrote to memory of 4884 3472 TDS Payment Challan.exe 82 PID 3472 wrote to memory of 4884 3472 TDS Payment Challan.exe 82 PID 3472 wrote to memory of 4884 3472 TDS Payment Challan.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2200
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD562aea7e47f647f9d6d2cdacb15e4b163
SHA1884550e92ac4ad9c24f3473d889b9247775f5ee5
SHA25673a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
SHA51259cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283
-
Filesize
671KB
MD562aea7e47f647f9d6d2cdacb15e4b163
SHA1884550e92ac4ad9c24f3473d889b9247775f5ee5
SHA25673a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
SHA51259cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283