Analysis
-
max time kernel
128s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/09/2022, 11:42
Behavioral task
behavioral1
Sample
Payment Confirmation Invoice.exe
Resource
win7-20220812-en
General
-
Target
Payment Confirmation Invoice.exe
-
Size
408KB
-
MD5
226bea0278f6534c83992d1ceac1c211
-
SHA1
b1a3df7bedbb45b0a2df9e575293d795996da01a
-
SHA256
29b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
-
SHA512
e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
SSDEEP
6144:ax9Xwhm7c/n10V7cMW4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:abXwhm7a1gB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 4 IoCs
resource yara_rule behavioral1/files/0x000a000000012752-58.dat family_kutaki behavioral1/files/0x000a000000012752-59.dat family_kutaki behavioral1/files/0x000a000000012752-61.dat family_kutaki behavioral1/files/0x000a000000012752-68.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 828 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe -
Loads dropped DLL 2 IoCs
pid Process 544 Payment Confirmation Invoice.exe 544 Payment Confirmation Invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main ch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 544 Payment Confirmation Invoice.exe 544 Payment Confirmation Invoice.exe 544 Payment Confirmation Invoice.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe 828 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 544 wrote to memory of 984 544 Payment Confirmation Invoice.exe 27 PID 544 wrote to memory of 984 544 Payment Confirmation Invoice.exe 27 PID 544 wrote to memory of 984 544 Payment Confirmation Invoice.exe 27 PID 544 wrote to memory of 984 544 Payment Confirmation Invoice.exe 27 PID 544 wrote to memory of 828 544 Payment Confirmation Invoice.exe 29 PID 544 wrote to memory of 828 544 Payment Confirmation Invoice.exe 29 PID 544 wrote to memory of 828 544 Payment Confirmation Invoice.exe 29 PID 544 wrote to memory of 828 544 Payment Confirmation Invoice.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:984
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e