Analysis
-
max time kernel
152s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2022, 18:40
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20220715-en
General
-
Target
Tax Payment Challan.exe
-
Size
795KB
-
MD5
17c53a651b72616b46ecb8f5215ed009
-
SHA1
c426cc3a5e333bafb8e0b0ed78515dc003da31c6
-
SHA256
bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4
-
SHA512
c2abab756d7351f819340857d1f500e7344838d28f744de6db39d5e3021b4382be3920b77985f057404f6b6206f09010f2bd0b2fcb61a944276145acf375c5c6
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0009000000022e6c-134.dat family_kutaki behavioral2/files/0x0009000000022e6c-135.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4460 hyuder.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe Tax Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum hyuder.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 hyuder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1296 Tax Payment Challan.exe 1296 Tax Payment Challan.exe 1296 Tax Payment Challan.exe 4460 hyuder.exe 4460 hyuder.exe 4460 hyuder.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4372 1296 Tax Payment Challan.exe 80 PID 1296 wrote to memory of 4372 1296 Tax Payment Challan.exe 80 PID 1296 wrote to memory of 4372 1296 Tax Payment Challan.exe 80 PID 1296 wrote to memory of 4460 1296 Tax Payment Challan.exe 84 PID 1296 wrote to memory of 4460 1296 Tax Payment Challan.exe 84 PID 1296 wrote to memory of 4460 1296 Tax Payment Challan.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyuder.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4460
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD517c53a651b72616b46ecb8f5215ed009
SHA1c426cc3a5e333bafb8e0b0ed78515dc003da31c6
SHA256bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4
SHA512c2abab756d7351f819340857d1f500e7344838d28f744de6db39d5e3021b4382be3920b77985f057404f6b6206f09010f2bd0b2fcb61a944276145acf375c5c6
-
Filesize
795KB
MD517c53a651b72616b46ecb8f5215ed009
SHA1c426cc3a5e333bafb8e0b0ed78515dc003da31c6
SHA256bd83761e9710a92a9b0b60a85c87f5aa2a27d30a8cff821e65df95d323d5b3d4
SHA512c2abab756d7351f819340857d1f500e7344838d28f744de6db39d5e3021b4382be3920b77985f057404f6b6206f09010f2bd0b2fcb61a944276145acf375c5c6