Analysis
-
max time kernel
105s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/09/2022, 07:51
Behavioral task
behavioral1
Sample
Payment Confirmation Invoice.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Confirmation Invoice.exe
Resource
win10v2004-20220901-en
General
-
Target
Payment Confirmation Invoice.exe
-
Size
408KB
-
MD5
226bea0278f6534c83992d1ceac1c211
-
SHA1
b1a3df7bedbb45b0a2df9e575293d795996da01a
-
SHA256
29b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
-
SHA512
e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
SSDEEP
6144:ax9Xwhm7c/n10V7cMW4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:abXwhm7a1gB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a0000000122e5-58.dat family_kutaki behavioral1/files/0x000a0000000122e5-59.dat family_kutaki behavioral1/files/0x000a0000000122e5-61.dat family_kutaki behavioral1/files/0x000a0000000122e5-68.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1804 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe -
Loads dropped DLL 2 IoCs
pid Process 780 Payment Confirmation Invoice.exe 780 Payment Confirmation Invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main ch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 780 Payment Confirmation Invoice.exe 780 Payment Confirmation Invoice.exe 780 Payment Confirmation Invoice.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe 1804 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 2036 780 Payment Confirmation Invoice.exe 29 PID 780 wrote to memory of 2036 780 Payment Confirmation Invoice.exe 29 PID 780 wrote to memory of 2036 780 Payment Confirmation Invoice.exe 29 PID 780 wrote to memory of 2036 780 Payment Confirmation Invoice.exe 29 PID 780 wrote to memory of 1804 780 Payment Confirmation Invoice.exe 31 PID 780 wrote to memory of 1804 780 Payment Confirmation Invoice.exe 31 PID 780 wrote to memory of 1804 780 Payment Confirmation Invoice.exe 31 PID 780 wrote to memory of 1804 780 Payment Confirmation Invoice.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:2036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e