Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2022, 04:01
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220718-en
General
-
Target
Tax Payment Challan.exe
-
Size
1.0MB
-
MD5
7d9d24216b329d14d4dd428a23070f29
-
SHA1
636d97af3f64ad9efe07c5b820e7afddbbf89f74
-
SHA256
998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
-
SHA512
4af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000c000000022e33-134.dat family_kutaki behavioral2/files/0x000c000000022e33-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2436 jpomdvf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe Tax Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum jpomdvf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 jpomdvf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3360 Tax Payment Challan.exe 3360 Tax Payment Challan.exe 3360 Tax Payment Challan.exe 2436 jpomdvf.exe 2436 jpomdvf.exe 2436 jpomdvf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3360 wrote to memory of 3596 3360 Tax Payment Challan.exe 83 PID 3360 wrote to memory of 3596 3360 Tax Payment Challan.exe 83 PID 3360 wrote to memory of 3596 3360 Tax Payment Challan.exe 83 PID 3360 wrote to memory of 2436 3360 Tax Payment Challan.exe 86 PID 3360 wrote to memory of 2436 3360 Tax Payment Challan.exe 86 PID 3360 wrote to memory of 2436 3360 Tax Payment Challan.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:3596
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jpomdvf.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53
-
Filesize
1.0MB
MD57d9d24216b329d14d4dd428a23070f29
SHA1636d97af3f64ad9efe07c5b820e7afddbbf89f74
SHA256998388008566177928bfbd0f18e36df434f262dc316726dff764e9b21045881b
SHA5124af9920e7a8d73457702c6ab7b27eb20bd42d4ccc18d8e5c2014e319584894f263d613a72d3de3a44a811a60dfa1bbb10371bc3ffce28d2ac22978fc23f06e53