Analysis
-
max time kernel
78s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24/07/2022, 20:24
Behavioral task
behavioral1
Sample
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe
Resource
win7-20220718-en
General
-
Target
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe
-
Size
636KB
-
MD5
d31babbee891b978c01df4bc1598b453
-
SHA1
973ec9c69c496bc7984388f7541e8f5f34d1721d
-
SHA256
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
SHA512
028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0008000000014675-58.dat family_kutaki behavioral1/files/0x0008000000014675-59.dat family_kutaki behavioral1/files/0x0008000000014675-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1328 bkkmpxch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bkkmpxch.exe b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bkkmpxch.exe b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe -
Loads dropped DLL 2 IoCs
pid Process 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bkkmpxch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bkkmpxch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe 1328 bkkmpxch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 892 wrote to memory of 944 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 28 PID 892 wrote to memory of 944 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 28 PID 892 wrote to memory of 944 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 28 PID 892 wrote to memory of 944 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 28 PID 892 wrote to memory of 1328 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 30 PID 892 wrote to memory of 1328 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 30 PID 892 wrote to memory of 1328 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 30 PID 892 wrote to memory of 1328 892 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe"C:\Users\Admin\AppData\Local\Temp\b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:944
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bkkmpxch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bkkmpxch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5d31babbee891b978c01df4bc1598b453
SHA1973ec9c69c496bc7984388f7541e8f5f34d1721d
SHA256b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
SHA512028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
-
Filesize
636KB
MD5d31babbee891b978c01df4bc1598b453
SHA1973ec9c69c496bc7984388f7541e8f5f34d1721d
SHA256b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
SHA512028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
-
Filesize
636KB
MD5d31babbee891b978c01df4bc1598b453
SHA1973ec9c69c496bc7984388f7541e8f5f34d1721d
SHA256b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
SHA512028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3