Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2022, 18:52
Behavioral task
behavioral1
Sample
State Bank of India Payment.exe
Resource
win7-20220812-en
General
-
Target
State Bank of India Payment.exe
-
Size
536KB
-
MD5
b01906f5328bf8df68d9c0e5637ee050
-
SHA1
9a83caa72c6c86d399acf1da16014a88654ee043
-
SHA256
b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
-
SHA512
969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036
-
SSDEEP
6144:1T1htGytvUf4yclQgx7+8DfpedxbKT3F9opcVyFW4Es+CS/wUcvzUjSa5pK2mKd4:TP+8DpFTvodFB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000300000001e805-138.dat family_kutaki behavioral2/files/0x000300000001e805-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4708 ch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe State Bank of India Payment.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe State Bank of India Payment.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 112 mspaint.exe 112 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2300 State Bank of India Payment.exe 2300 State Bank of India Payment.exe 2300 State Bank of India Payment.exe 112 mspaint.exe 112 mspaint.exe 112 mspaint.exe 112 mspaint.exe 4708 ch.exe 4708 ch.exe 4708 ch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1544 2300 State Bank of India Payment.exe 84 PID 2300 wrote to memory of 1544 2300 State Bank of India Payment.exe 84 PID 2300 wrote to memory of 1544 2300 State Bank of India Payment.exe 84 PID 1544 wrote to memory of 112 1544 cmd.exe 86 PID 1544 wrote to memory of 112 1544 cmd.exe 86 PID 1544 wrote to memory of 112 1544 cmd.exe 86 PID 2300 wrote to memory of 4708 2300 State Bank of India Payment.exe 92 PID 2300 wrote to memory of 4708 2300 State Bank of India Payment.exe 92 PID 2300 wrote to memory of 4708 2300 State Bank of India Payment.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\State Bank of India Payment.exe"C:\Users\Admin\AppData\Local\Temp\State Bank of India Payment.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:112
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5b01906f5328bf8df68d9c0e5637ee050
SHA19a83caa72c6c86d399acf1da16014a88654ee043
SHA256b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
SHA512969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036
-
Filesize
536KB
MD5b01906f5328bf8df68d9c0e5637ee050
SHA19a83caa72c6c86d399acf1da16014a88654ee043
SHA256b81ce1757e7d279ca226e752baa9422622119a49e8364866b91667301c74e589
SHA512969c1789142c9ad646c4232e8f46ebf0bae4d0f20ba25d4d30b32a0a263917a65584bc5f2eb4145ead0a80453f168ceae4c4a12078a43fdd2fa504239e2eb036