Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 11:11
Behavioral task
behavioral1
Sample
ITC.exe
Resource
win7-20220812-en
General
-
Target
ITC.exe
-
Size
544KB
-
MD5
039f072565f5c1a20edbddc6a8cd4b7e
-
SHA1
0b0577a885f82fd073dc1f86e5ee6e72054030e1
-
SHA256
83d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
-
SHA512
74a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd
-
SSDEEP
6144:m8ylUOltoMFD95ad/gvlfZPFHrbl3wL0n9/G0GM5JLMKRMWBXd+tPdv5W4Es+CSE:p2YcJmW/+b5B4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000200000001e5ab-138.dat family_kutaki behavioral2/files/0x000200000001e5ab-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2812 ch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe ITC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe ITC.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1360 mspaint.exe 1360 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3588 ITC.exe 3588 ITC.exe 3588 ITC.exe 1360 mspaint.exe 1360 mspaint.exe 1360 mspaint.exe 1360 mspaint.exe 2812 ch.exe 2812 ch.exe 2812 ch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3052 3588 ITC.exe 79 PID 3588 wrote to memory of 3052 3588 ITC.exe 79 PID 3588 wrote to memory of 3052 3588 ITC.exe 79 PID 3052 wrote to memory of 1360 3052 cmd.exe 81 PID 3052 wrote to memory of 1360 3052 cmd.exe 81 PID 3052 wrote to memory of 1360 3052 cmd.exe 81 PID 3588 wrote to memory of 2812 3588 ITC.exe 87 PID 3588 wrote to memory of 2812 3588 ITC.exe 87 PID 3588 wrote to memory of 2812 3588 ITC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ITC.exe"C:\Users\Admin\AppData\Local\Temp\ITC.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5039f072565f5c1a20edbddc6a8cd4b7e
SHA10b0577a885f82fd073dc1f86e5ee6e72054030e1
SHA25683d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
SHA51274a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd
-
Filesize
544KB
MD5039f072565f5c1a20edbddc6a8cd4b7e
SHA10b0577a885f82fd073dc1f86e5ee6e72054030e1
SHA25683d66249977c93aee45be9aa3e6ccfc2b450c23bc9db6e8e0764ed35e1b5a06e
SHA51274a08454326688fc944d05ec9d37ee21aa1de2bd5ab5d03c7360bf0245650a083bb8e77fba876475513750154809c437db0fd92b18386fcca98cc3d82cf907fd