Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2022, 20:24
Behavioral task
behavioral1
Sample
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe
Resource
win7-20220718-en
General
-
Target
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe
-
Size
636KB
-
MD5
d31babbee891b978c01df4bc1598b453
-
SHA1
973ec9c69c496bc7984388f7541e8f5f34d1721d
-
SHA256
b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
-
SHA512
028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000b000000022f51-134.dat family_kutaki behavioral2/files/0x000b000000022f51-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1208 ifoaovch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ifoaovch.exe b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ifoaovch.exe b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ifoaovch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ifoaovch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 1208 ifoaovch.exe 1208 ifoaovch.exe 1208 ifoaovch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4236 wrote to memory of 5000 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 80 PID 4236 wrote to memory of 5000 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 80 PID 4236 wrote to memory of 5000 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 80 PID 4236 wrote to memory of 1208 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 82 PID 4236 wrote to memory of 1208 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 82 PID 4236 wrote to memory of 1208 4236 b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe"C:\Users\Admin\AppData\Local\Temp\b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:5000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ifoaovch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ifoaovch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5d31babbee891b978c01df4bc1598b453
SHA1973ec9c69c496bc7984388f7541e8f5f34d1721d
SHA256b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
SHA512028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3
-
Filesize
636KB
MD5d31babbee891b978c01df4bc1598b453
SHA1973ec9c69c496bc7984388f7541e8f5f34d1721d
SHA256b5b970b6d52e53a875ffc8e03065bd6dc200431b9f8f88b6632a73193407e0bf
SHA512028ba6e00e41594e6d77ec6ecc216378cf59b5a33a936b9237b7f4ac8ab8fd265bf5f3914e61ad1bcb9927b204c51b706140d451fb4910992b3d4694331980b3