Analysis
-
max time kernel
71s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-09-2022 11:52
General
-
Target
Tax Payment Challan.exe
-
Size
504KB
-
MD5
705d8000b54163c1dd91960beb5c89b0
-
SHA1
5dc9cb229d61bf68627376603aa569f025b651bf
-
SHA256
efc7ec481193132dd58b741c3ccf3451c950ac3a446bd966e9a4d266439b9451
-
SHA512
a2fee29eca137a6e870ef2860c2dc5571913ef8f77179c083baf7cd26b51f129c030ecd43b2d3889871ebf6d10b3ebdbf53196470f1b3fdf9c65a0175f9a4b70
-
SSDEEP
12288:2urv+oNBBIqJKcGB4/8vYjDpK8atfx8hDu:brv+oNBBf/8vYjEPx8hC
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral1/files/0x000a00000001ac68-256.dat family_kutaki behavioral1/files/0x000a00000001ac68-272.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4640 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Tax Payment Challan.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3316 mspaint.exe 3316 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4788 Tax Payment Challan.exe 4788 Tax Payment Challan.exe 4788 Tax Payment Challan.exe 4640 ch.exe 3316 mspaint.exe 4640 ch.exe 4640 ch.exe 3316 mspaint.exe 3316 mspaint.exe 3316 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1220 4788 Tax Payment Challan.exe 67 PID 4788 wrote to memory of 1220 4788 Tax Payment Challan.exe 67 PID 4788 wrote to memory of 1220 4788 Tax Payment Challan.exe 67 PID 1220 wrote to memory of 3316 1220 cmd.exe 70 PID 1220 wrote to memory of 3316 1220 cmd.exe 70 PID 1220 wrote to memory of 3316 1220 cmd.exe 70 PID 4788 wrote to memory of 4640 4788 Tax Payment Challan.exe 71 PID 4788 wrote to memory of 4640 4788 Tax Payment Challan.exe 71 PID 4788 wrote to memory of 4640 4788 Tax Payment Challan.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3316
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5705d8000b54163c1dd91960beb5c89b0
SHA15dc9cb229d61bf68627376603aa569f025b651bf
SHA256efc7ec481193132dd58b741c3ccf3451c950ac3a446bd966e9a4d266439b9451
SHA512a2fee29eca137a6e870ef2860c2dc5571913ef8f77179c083baf7cd26b51f129c030ecd43b2d3889871ebf6d10b3ebdbf53196470f1b3fdf9c65a0175f9a4b70
-
Filesize
504KB
MD5705d8000b54163c1dd91960beb5c89b0
SHA15dc9cb229d61bf68627376603aa569f025b651bf
SHA256efc7ec481193132dd58b741c3ccf3451c950ac3a446bd966e9a4d266439b9451
SHA512a2fee29eca137a6e870ef2860c2dc5571913ef8f77179c083baf7cd26b51f129c030ecd43b2d3889871ebf6d10b3ebdbf53196470f1b3fdf9c65a0175f9a4b70