Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
01/08/2022, 10:38
Behavioral task
behavioral1
Sample
NEFT_Payment.exe
Resource
win7-20220718-en
General
-
Target
NEFT_Payment.exe
-
Size
2.6MB
-
MD5
70e966394bf9947ff01b681bab9d0f71
-
SHA1
53946411e4e975a9ed354b16cd22041108e9f596
-
SHA256
c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
-
SHA512
a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
Malware Config
Extracted
kutaki
http://ojorobia.club/laptop/laptop.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000800000000368a-58.dat family_kutaki behavioral1/files/0x000800000000368a-59.dat family_kutaki behavioral1/files/0x000800000000368a-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1104 bwiexlch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bwiexlch.exe NEFT_Payment.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bwiexlch.exe NEFT_Payment.exe -
Loads dropped DLL 2 IoCs
pid Process 540 NEFT_Payment.exe 540 NEFT_Payment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 540 NEFT_Payment.exe 540 NEFT_Payment.exe 540 NEFT_Payment.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe 1104 bwiexlch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 540 wrote to memory of 1372 540 NEFT_Payment.exe 29 PID 540 wrote to memory of 1372 540 NEFT_Payment.exe 29 PID 540 wrote to memory of 1372 540 NEFT_Payment.exe 29 PID 540 wrote to memory of 1372 540 NEFT_Payment.exe 29 PID 540 wrote to memory of 1104 540 NEFT_Payment.exe 31 PID 540 wrote to memory of 1104 540 NEFT_Payment.exe 31 PID 540 wrote to memory of 1104 540 NEFT_Payment.exe 31 PID 540 wrote to memory of 1104 540 NEFT_Payment.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEFT_Payment.exe"C:\Users\Admin\AppData\Local\Temp\NEFT_Payment.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bwiexlch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bwiexlch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200