Analysis
-
max time kernel
159s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
30/07/2022, 20:22
Behavioral task
behavioral1
Sample
TDS Invoice.exe
Resource
win7-20220715-en
General
-
Target
TDS Invoice.exe
-
Size
840KB
-
MD5
03d14d25935aabae662a09db5146ea35
-
SHA1
e75ffa7ef6be023be366f95dedffff934e890f06
-
SHA256
3a3ea1848d9834a0959b57b6225cc5730b3d576e8a73bdc129622a12d6e51bc0
-
SHA512
3f1cd8d0032f49a5a724479f45c3767910cfb9196aeec051a3e162af99631814cfb7fa9729274c091d6ca49a3db87a3f53d3d01eb72eb573f771eaca5617f61a
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000300000001e40f-136.dat family_kutaki behavioral2/files/0x000300000001e40f-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3372 fmxfepch.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fmxfepch.exe TDS Invoice.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fmxfepch.exe TDS Invoice.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 fmxfepch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fmxfepch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 TDS Invoice.exe 2796 TDS Invoice.exe 2796 TDS Invoice.exe 3372 fmxfepch.exe 3372 fmxfepch.exe 3372 fmxfepch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4276 2796 TDS Invoice.exe 82 PID 2796 wrote to memory of 4276 2796 TDS Invoice.exe 82 PID 2796 wrote to memory of 4276 2796 TDS Invoice.exe 82 PID 2796 wrote to memory of 3372 2796 TDS Invoice.exe 94 PID 2796 wrote to memory of 3372 2796 TDS Invoice.exe 94 PID 2796 wrote to memory of 3372 2796 TDS Invoice.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Invoice.exe"C:\Users\Admin\AppData\Local\Temp\TDS Invoice.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4276
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fmxfepch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fmxfepch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:3372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD503d14d25935aabae662a09db5146ea35
SHA1e75ffa7ef6be023be366f95dedffff934e890f06
SHA2563a3ea1848d9834a0959b57b6225cc5730b3d576e8a73bdc129622a12d6e51bc0
SHA5123f1cd8d0032f49a5a724479f45c3767910cfb9196aeec051a3e162af99631814cfb7fa9729274c091d6ca49a3db87a3f53d3d01eb72eb573f771eaca5617f61a
-
Filesize
840KB
MD503d14d25935aabae662a09db5146ea35
SHA1e75ffa7ef6be023be366f95dedffff934e890f06
SHA2563a3ea1848d9834a0959b57b6225cc5730b3d576e8a73bdc129622a12d6e51bc0
SHA5123f1cd8d0032f49a5a724479f45c3767910cfb9196aeec051a3e162af99631814cfb7fa9729274c091d6ca49a3db87a3f53d3d01eb72eb573f771eaca5617f61a