Analysis
-
max time kernel
97s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 11:11
Behavioral task
behavioral1
Sample
ITC.exe
Resource
win7-20220812-en
General
-
Target
ITC.exe
-
Size
544KB
-
MD5
039f072565f5c1a20edbddc6a8cd4b7e
-
SHA1
0b0577a885f82fd073dc1f86e5ee6e72054030e1
-
SHA256
83d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
-
SHA512
74a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd
-
SSDEEP
6144:m8ylUOltoMFD95ad/gvlfZPFHrbl3wL0n9/G0GM5JLMKRMWBXd+tPdv5W4Es+CSE:p2YcJmW/+b5B4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x00090000000134d5-59.dat family_kutaki behavioral1/files/0x00090000000134d5-58.dat family_kutaki behavioral1/files/0x00090000000134d5-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1144 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe ITC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe ITC.exe -
Loads dropped DLL 2 IoCs
pid Process 536 ITC.exe 536 ITC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 536 ITC.exe 536 ITC.exe 536 ITC.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe 1144 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 536 wrote to memory of 1724 536 ITC.exe 28 PID 536 wrote to memory of 1724 536 ITC.exe 28 PID 536 wrote to memory of 1724 536 ITC.exe 28 PID 536 wrote to memory of 1724 536 ITC.exe 28 PID 536 wrote to memory of 1144 536 ITC.exe 30 PID 536 wrote to memory of 1144 536 ITC.exe 30 PID 536 wrote to memory of 1144 536 ITC.exe 30 PID 536 wrote to memory of 1144 536 ITC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ITC.exe"C:\Users\Admin\AppData\Local\Temp\ITC.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5039f072565f5c1a20edbddc6a8cd4b7e
SHA10b0577a885f82fd073dc1f86e5ee6e72054030e1
SHA25683d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
SHA51274a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd
-
Filesize
544KB
MD5039f072565f5c1a20edbddc6a8cd4b7e
SHA10b0577a885f82fd073dc1f86e5ee6e72054030e1
SHA25683d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
SHA51274a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd
-
Filesize
544KB
MD5039f072565f5c1a20edbddc6a8cd4b7e
SHA10b0577a885f82fd073dc1f86e5ee6e72054030e1
SHA25683d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
SHA51274a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd