Analysis
-
max time kernel
125s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2022, 04:53
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220718-en
General
-
Target
Tax Payment Challan.exe
-
Size
768KB
-
MD5
d25f259e5943e02244d5a6fb3cc9b778
-
SHA1
ae4c93a5264acdf26a11cd9165f7382afceedb50
-
SHA256
4b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
-
SHA512
8363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019
Malware Config
Extracted
kutaki
http://newloshree.xyz/work/kenny3.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000a000000022eb4-135.dat family_kutaki behavioral2/files/0x000a000000022eb4-136.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4328 ch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 376 mspaint.exe 376 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3148 Tax Payment Challan.exe 3148 Tax Payment Challan.exe 3148 Tax Payment Challan.exe 376 mspaint.exe 4328 ch.exe 376 mspaint.exe 376 mspaint.exe 376 mspaint.exe 4328 ch.exe 4328 ch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3428 3148 Tax Payment Challan.exe 78 PID 3148 wrote to memory of 3428 3148 Tax Payment Challan.exe 78 PID 3148 wrote to memory of 3428 3148 Tax Payment Challan.exe 78 PID 3428 wrote to memory of 376 3428 cmd.exe 80 PID 3428 wrote to memory of 376 3428 cmd.exe 80 PID 3428 wrote to memory of 376 3428 cmd.exe 80 PID 3148 wrote to memory of 4328 3148 Tax Payment Challan.exe 82 PID 3148 wrote to memory of 4328 3148 Tax Payment Challan.exe 82 PID 3148 wrote to memory of 4328 3148 Tax Payment Challan.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD5d25f259e5943e02244d5a6fb3cc9b778
SHA1ae4c93a5264acdf26a11cd9165f7382afceedb50
SHA2564b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
SHA5128363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019
-
Filesize
768KB
MD5d25f259e5943e02244d5a6fb3cc9b778
SHA1ae4c93a5264acdf26a11cd9165f7382afceedb50
SHA2564b0f2eb3c83c7a8f9bf0f945feeadad30cb7e5432f6c66fe7d6b921925ce142a
SHA5128363351c576a8be88a02408ebcfc60a6c5abc0db402cd12b349c80b787bb3fd9bc2ab6206c3a7293ff187b61d0da2cdf6100020836c8a590a2181689c72fd019