Analysis
-
max time kernel
146s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
02/08/2022, 02:35
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe
Resource
win7-20220715-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe
-
Size
2.6MB
-
MD5
70e966394bf9947ff01b681bab9d0f71
-
SHA1
53946411e4e975a9ed354b16cd22041108e9f596
-
SHA256
c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
-
SHA512
a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
Malware Config
Extracted
kutaki
http://ojorobia.club/laptop/laptop.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0007000000005c51-61.dat family_kutaki behavioral1/files/0x0007000000005c51-59.dat family_kutaki behavioral1/files/0x0007000000005c51-58.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2008 szdxunch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\szdxunch.exe SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\szdxunch.exe SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe -
Loads dropped DLL 2 IoCs
pid Process 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe 2008 szdxunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1048 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 28 PID 1864 wrote to memory of 1048 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 28 PID 1864 wrote to memory of 1048 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 28 PID 1864 wrote to memory of 1048 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 28 PID 1864 wrote to memory of 2008 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 30 PID 1864 wrote to memory of 2008 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 30 PID 1864 wrote to memory of 2008 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 30 PID 1864 wrote to memory of 2008 1864 SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.61120451.25553.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1048
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\szdxunch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\szdxunch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200
-
Filesize
2.6MB
MD570e966394bf9947ff01b681bab9d0f71
SHA153946411e4e975a9ed354b16cd22041108e9f596
SHA256c7e3deb446233da1eb6c6df66913065773d510a21750a9ea675b69be46ab245a
SHA512a71a0b9b265b3c31c01305b121b386b8beb14cb6f670df4cbdad3d2fb7a3b3c508b25b48b253cba4c9aacde77e47fc32481fdc4cfc9221af83ea90ab7a6fc200