Analysis
-
max time kernel
154s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25/07/2022, 04:01
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220718-en
General
-
Target
Tax Payment Challan.exe
-
Size
1.0MB
-
MD5
7d9d24216b329d14d4dd428a23070f29
-
SHA1
636d97af3f64ad9efe07c5b820e7afddbbf89f74
-
SHA256
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
SHA512
4af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
Malware Config
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a000000012314-58.dat family_kutaki behavioral1/files/0x000a000000012314-59.dat family_kutaki behavioral1/files/0x000a000000012314-61.dat family_kutaki behavioral1/files/0x000a000000012314-66.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1664 jpomdvf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe Tax Payment Challan.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 Tax Payment Challan.exe 1764 Tax Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum jpomdvf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 jpomdvf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main jpomdvf.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 Tax Payment Challan.exe 1764 Tax Payment Challan.exe 1764 Tax Payment Challan.exe 1664 jpomdvf.exe 1664 jpomdvf.exe 1664 jpomdvf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1660 1764 Tax Payment Challan.exe 28 PID 1764 wrote to memory of 1660 1764 Tax Payment Challan.exe 28 PID 1764 wrote to memory of 1660 1764 Tax Payment Challan.exe 28 PID 1764 wrote to memory of 1660 1764 Tax Payment Challan.exe 28 PID 1764 wrote to memory of 1664 1764 Tax Payment Challan.exe 30 PID 1764 wrote to memory of 1664 1764 Tax Payment Challan.exe 30 PID 1764 wrote to memory of 1664 1764 Tax Payment Challan.exe 30 PID 1764 wrote to memory of 1664 1764 Tax Payment Challan.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1660
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53