Analysis
-
max time kernel
113s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
22/07/2022, 04:53
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220718-en
General
-
Target
Tax Payment Challan.exe
-
Size
768KB
-
MD5
d25f259e5943e02244d5a6fb3cc9b778
-
SHA1
ae4c93a5264acdf26a11cd9165f7382afceedb50
-
SHA256
4b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
-
SHA512
8363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019
Malware Config
Extracted
kutaki
http://newloshree.xyz/work/kenny3.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ed-58.dat family_kutaki behavioral1/files/0x000a0000000122ed-60.dat family_kutaki behavioral1/files/0x000a0000000122ed-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1652 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 Tax Payment Challan.exe 1668 Tax Payment Challan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1016 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1668 Tax Payment Challan.exe 1668 Tax Payment Challan.exe 1668 Tax Payment Challan.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe 1652 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1240 1668 Tax Payment Challan.exe 29 PID 1668 wrote to memory of 1240 1668 Tax Payment Challan.exe 29 PID 1668 wrote to memory of 1240 1668 Tax Payment Challan.exe 29 PID 1668 wrote to memory of 1240 1668 Tax Payment Challan.exe 29 PID 1668 wrote to memory of 1652 1668 Tax Payment Challan.exe 31 PID 1668 wrote to memory of 1652 1668 Tax Payment Challan.exe 31 PID 1668 wrote to memory of 1652 1668 Tax Payment Challan.exe 31 PID 1668 wrote to memory of 1652 1668 Tax Payment Challan.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1240
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD5d25f259e5943e02244d5a6fb3cc9b778
SHA1ae4c93a5264acdf26a11cd9165f7382afceedb50
SHA2564b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
SHA5128363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019
-
Filesize
768KB
MD5d25f259e5943e02244d5a6fb3cc9b778
SHA1ae4c93a5264acdf26a11cd9165f7382afceedb50
SHA2564b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
SHA5128363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019
-
Filesize
768KB
MD5d25f259e5943e02244d5a6fb3cc9b778
SHA1ae4c93a5264acdf26a11cd9165f7382afceedb50
SHA2564b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
SHA5128363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019