Analysis
-
max time kernel
106s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 14:32
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20220812-en
General
-
Target
4.exe
-
Size
536KB
-
MD5
2a189ba5e989daca58342a7dd038b142
-
SHA1
abbaecc7acad08d1163a452cb56aa1d71c3582f8
-
SHA256
5587ae6cef689c180254ba9d455eb62c171c4bbb20f82af7450ea2eeff4eac1e
-
SHA512
f22d03a70d3177096acb5f62f9f6949df2478cb7d2dea40fc2057b6f8ebf8bc28320f23e1c9a4edd92753baa989cea7d19482582a6d5878d3e9815c0ab800baa
-
SSDEEP
6144:NT1htGytvUf4yclQgx7+8DfpedxbKT3F9opcVyUW4Es+CS/wUcvzUjSa5pK2mKd4:7P+8DpFTvodUB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001339d-58.dat family_kutaki behavioral1/files/0x000a00000001339d-59.dat family_kutaki behavioral1/files/0x000a00000001339d-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2040 ch.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe 4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe 4.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 4.exe 1684 4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 520 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1684 4.exe 1684 4.exe 1684 4.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe 2040 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1112 1684 4.exe 28 PID 1684 wrote to memory of 1112 1684 4.exe 28 PID 1684 wrote to memory of 1112 1684 4.exe 28 PID 1684 wrote to memory of 1112 1684 4.exe 28 PID 1684 wrote to memory of 2040 1684 4.exe 30 PID 1684 wrote to memory of 2040 1684 4.exe 30 PID 1684 wrote to memory of 2040 1684 4.exe 30 PID 1684 wrote to memory of 2040 1684 4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1112
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD52a189ba5e989daca58342a7dd038b142
SHA1abbaecc7acad08d1163a452cb56aa1d71c3582f8
SHA2565587ae6cef689c180254ba9d455eb62c171c4bbb20f82af7450ea2eeff4eac1e
SHA512f22d03a70d3177096acb5f62f9f6949df2478cb7d2dea40fc2057b6f8ebf8bc28320f23e1c9a4edd92753baa989cea7d19482582a6d5878d3e9815c0ab800baa
-
Filesize
536KB
MD52a189ba5e989daca58342a7dd038b142
SHA1abbaecc7acad08d1163a452cb56aa1d71c3582f8
SHA2565587ae6cef689c180254ba9d455eb62c171c4bbb20f82af7450ea2eeff4eac1e
SHA512f22d03a70d3177096acb5f62f9f6949df2478cb7d2dea40fc2057b6f8ebf8bc28320f23e1c9a4edd92753baa989cea7d19482582a6d5878d3e9815c0ab800baa
-
Filesize
536KB
MD52a189ba5e989daca58342a7dd038b142
SHA1abbaecc7acad08d1163a452cb56aa1d71c3582f8
SHA2565587ae6cef689c180254ba9d455eb62c171c4bbb20f82af7450ea2eeff4eac1e
SHA512f22d03a70d3177096acb5f62f9f6949df2478cb7d2dea40fc2057b6f8ebf8bc28320f23e1c9a4edd92753baa989cea7d19482582a6d5878d3e9815c0ab800baa