Analysis
-
max time kernel
124s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 11:42
Behavioral task
behavioral1
Sample
Payment Confirmation Invoice.exe
Resource
win7-20220812-en
General
-
Target
Payment Confirmation Invoice.exe
-
Size
408KB
-
MD5
226bea0278f6534c83992d1ceac1c211
-
SHA1
b1a3df7bedbb45b0a2df9e575293d795996da01a
-
SHA256
29b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
-
SHA512
e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
SSDEEP
6144:ax9Xwhm7c/n10V7cMW4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:abXwhm7a1gB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000400000001d9f7-137.dat family_kutaki behavioral2/files/0x000400000001d9f7-138.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 808 ch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe Payment Confirmation Invoice.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 mspaint.exe 4724 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2072 Payment Confirmation Invoice.exe 2072 Payment Confirmation Invoice.exe 2072 Payment Confirmation Invoice.exe 4724 mspaint.exe 4724 mspaint.exe 808 ch.exe 4724 mspaint.exe 4724 mspaint.exe 808 ch.exe 808 ch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2072 wrote to memory of 540 2072 Payment Confirmation Invoice.exe 83 PID 2072 wrote to memory of 540 2072 Payment Confirmation Invoice.exe 83 PID 2072 wrote to memory of 540 2072 Payment Confirmation Invoice.exe 83 PID 540 wrote to memory of 4724 540 cmd.exe 84 PID 540 wrote to memory of 4724 540 cmd.exe 84 PID 540 wrote to memory of 4724 540 cmd.exe 84 PID 2072 wrote to memory of 808 2072 Payment Confirmation Invoice.exe 89 PID 2072 wrote to memory of 808 2072 Payment Confirmation Invoice.exe 89 PID 2072 wrote to memory of 808 2072 Payment Confirmation Invoice.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
Filesize
408KB
MD5226bea0278f6534c83992d1ceac1c211
SHA1b1a3df7bedbb45b0a2df9e575293d795996da01a
SHA25629b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
SHA512e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e