Analysis
-
max time kernel
104s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/09/2022, 09:58
Behavioral task
behavioral1
Sample
HDFC Tax Payment Confirmation.exe
Resource
win7-20220812-en
General
-
Target
HDFC Tax Payment Confirmation.exe
-
Size
544KB
-
MD5
4d99bb4a8d588039573908a4cb9c1f5d
-
SHA1
15feba0a4ad53bdb7135fd58de01dee088301646
-
SHA256
b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
-
SHA512
1884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda
-
SSDEEP
6144:M8ylUOltoMFD95ad/gvlfZPFHrbl3wL0n9/G0GM5JLMKRMWBXd+tPdvcW4Es+CSE:j2YcJmW/+bcB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x00090000000122eb-59.dat family_kutaki behavioral1/files/0x00090000000122eb-58.dat family_kutaki behavioral1/files/0x00090000000122eb-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 856 ch.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe HDFC Tax Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe HDFC Tax Payment Confirmation.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 HDFC Tax Payment Confirmation.exe 1972 HDFC Tax Payment Confirmation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1972 HDFC Tax Payment Confirmation.exe 1972 HDFC Tax Payment Confirmation.exe 1972 HDFC Tax Payment Confirmation.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe 856 ch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1360 1972 HDFC Tax Payment Confirmation.exe 29 PID 1972 wrote to memory of 1360 1972 HDFC Tax Payment Confirmation.exe 29 PID 1972 wrote to memory of 1360 1972 HDFC Tax Payment Confirmation.exe 29 PID 1972 wrote to memory of 1360 1972 HDFC Tax Payment Confirmation.exe 29 PID 1972 wrote to memory of 856 1972 HDFC Tax Payment Confirmation.exe 31 PID 1972 wrote to memory of 856 1972 HDFC Tax Payment Confirmation.exe 31 PID 1972 wrote to memory of 856 1972 HDFC Tax Payment Confirmation.exe 31 PID 1972 wrote to memory of 856 1972 HDFC Tax Payment Confirmation.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\HDFC Tax Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\HDFC Tax Payment Confirmation.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1360
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD54d99bb4a8d588039573908a4cb9c1f5d
SHA115feba0a4ad53bdb7135fd58de01dee088301646
SHA256b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
SHA5121884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda
-
Filesize
544KB
MD54d99bb4a8d588039573908a4cb9c1f5d
SHA115feba0a4ad53bdb7135fd58de01dee088301646
SHA256b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
SHA5121884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda
-
Filesize
544KB
MD54d99bb4a8d588039573908a4cb9c1f5d
SHA115feba0a4ad53bdb7135fd58de01dee088301646
SHA256b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
SHA5121884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda