Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2022, 03:57
Behavioral task
behavioral1
Sample
d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe
Resource
win7-20220812-en
General
-
Target
d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe
-
Size
3.1MB
-
MD5
79e5e9c2a96ad4bf443565f151afd809
-
SHA1
a6a692f7e9733f823d9659e6bae87c096f0f1170
-
SHA256
d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69
-
SHA512
7d0f385dc4a480fe366461fd0221b7c792d41a35fea5b9586c083f5cf9f42a5a2a916c60bf71f82ce32b899c61626f761f51bfe904b9e8fee68d7605af8b4019
-
SSDEEP
12288:C1dAHWyU4QtcQSsdgHy46A9jmP/uhu/yMS08CkntxYRh:A1rtqfJfmP/UDMS08Ckn3g
Malware Config
Extracted
kutaki
http://ojorobia.club/laptop/laptop.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0009000000022de3-136.dat family_kutaki behavioral2/files/0x0009000000022de3-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3408 tidqsrfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tidqsrfk.exe d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tidqsrfk.exe d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 3408 tidqsrfk.exe 3408 tidqsrfk.exe 3408 tidqsrfk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4524 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 83 PID 5088 wrote to memory of 4524 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 83 PID 5088 wrote to memory of 4524 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 83 PID 5088 wrote to memory of 3408 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 85 PID 5088 wrote to memory of 3408 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 85 PID 5088 wrote to memory of 3408 5088 d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe"C:\Users\Admin\AppData\Local\Temp\d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4524
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tidqsrfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tidqsrfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3408
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD579e5e9c2a96ad4bf443565f151afd809
SHA1a6a692f7e9733f823d9659e6bae87c096f0f1170
SHA256d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69
SHA5127d0f385dc4a480fe366461fd0221b7c792d41a35fea5b9586c083f5cf9f42a5a2a916c60bf71f82ce32b899c61626f761f51bfe904b9e8fee68d7605af8b4019
-
Filesize
3.1MB
MD579e5e9c2a96ad4bf443565f151afd809
SHA1a6a692f7e9733f823d9659e6bae87c096f0f1170
SHA256d510b26ecf363b3ff1889ae6057482bbba5254cf7440ed42efaa37fa3aa8cf69
SHA5127d0f385dc4a480fe366461fd0221b7c792d41a35fea5b9586c083f5cf9f42a5a2a916c60bf71f82ce32b899c61626f761f51bfe904b9e8fee68d7605af8b4019