Analysis
-
max time kernel
101s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 18:52
Behavioral task
behavioral1
Sample
State Bank of India Payment.exe
Resource
win7-20220812-en
General
-
Target
State Bank of India Payment.exe
-
Size
536KB
-
MD5
b01906f5328bf8df68d9c0e5637ee050
-
SHA1
9a83caa72c6c86d399acf1da16014a88654ee043
-
SHA256
b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
-
SHA512
969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036
-
SSDEEP
6144:1T1htGytvUf4yclQgx7+8DfpedxbKT3F9opcVyFW4Es+CS/wUcvzUjSa5pK2mKd4:TP+8DpFTvodFB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000a000000012356-58.dat family_kutaki behavioral1/files/0x000a000000012356-59.dat family_kutaki behavioral1/files/0x000a000000012356-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1244 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe State Bank of India Payment.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe State Bank of India Payment.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 State Bank of India Payment.exe 1708 State Bank of India Payment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1796 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1708 State Bank of India Payment.exe 1708 State Bank of India Payment.exe 1708 State Bank of India Payment.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe 1244 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1372 1708 State Bank of India Payment.exe 27 PID 1708 wrote to memory of 1372 1708 State Bank of India Payment.exe 27 PID 1708 wrote to memory of 1372 1708 State Bank of India Payment.exe 27 PID 1708 wrote to memory of 1372 1708 State Bank of India Payment.exe 27 PID 1708 wrote to memory of 1244 1708 State Bank of India Payment.exe 29 PID 1708 wrote to memory of 1244 1708 State Bank of India Payment.exe 29 PID 1708 wrote to memory of 1244 1708 State Bank of India Payment.exe 29 PID 1708 wrote to memory of 1244 1708 State Bank of India Payment.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\State Bank of India Payment.exe"C:\Users\Admin\AppData\Local\Temp\State Bank of India Payment.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5b01906f5328bf8df68d9c0e5637ee050
SHA19a83caa72c6c86d399acf1da16014a88654ee043
SHA256b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
SHA512969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036
-
Filesize
536KB
MD5b01906f5328bf8df68d9c0e5637ee050
SHA19a83caa72c6c86d399acf1da16014a88654ee043
SHA256b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
SHA512969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036
-
Filesize
536KB
MD5b01906f5328bf8df68d9c0e5637ee050
SHA19a83caa72c6c86d399acf1da16014a88654ee043
SHA256b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
SHA512969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036