Analysis
-
max time kernel
78s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31/07/2022, 05:12
Behavioral task
behavioral1
Sample
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe
Resource
win7-20220718-en
General
-
Target
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe
-
Size
724KB
-
MD5
122e0e9fc5119d3e9f075f36b594c70c
-
SHA1
79849b0335bd1a85fd91c4e81422ee0376ab89b3
-
SHA256
7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
-
SHA512
f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0006000000008527-58.dat family_kutaki behavioral1/files/0x0006000000008527-61.dat family_kutaki behavioral1/files/0x0006000000008527-59.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1416 itiijvch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\itiijvch.exe 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\itiijvch.exe 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe -
Loads dropped DLL 2 IoCs
pid Process 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum itiijvch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 itiijvch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe 1416 itiijvch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 840 wrote to memory of 1980 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 28 PID 840 wrote to memory of 1980 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 28 PID 840 wrote to memory of 1980 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 28 PID 840 wrote to memory of 1980 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 28 PID 840 wrote to memory of 1416 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 30 PID 840 wrote to memory of 1416 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 30 PID 840 wrote to memory of 1416 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 30 PID 840 wrote to memory of 1416 840 7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe"C:\Users\Admin\AppData\Local\Temp\7a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1980
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\itiijvch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\itiijvch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5122e0e9fc5119d3e9f075f36b594c70c
SHA179849b0335bd1a85fd91c4e81422ee0376ab89b3
SHA2567a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
SHA512f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4
-
Filesize
724KB
MD5122e0e9fc5119d3e9f075f36b594c70c
SHA179849b0335bd1a85fd91c4e81422ee0376ab89b3
SHA2567a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
SHA512f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4
-
Filesize
724KB
MD5122e0e9fc5119d3e9f075f36b594c70c
SHA179849b0335bd1a85fd91c4e81422ee0376ab89b3
SHA2567a66212137146efd89a165b9d58fb49ee33fbd7c642e3fa216d626ef52f7ddb1
SHA512f2925dbb618a0ad33f5d5f376e76079cee6c1772ea8b29c82f6f6d203f2600ea1badcf0136291e8dd8aee34189adb20668b4faf999408351bfb91ad91ffbb5a4