Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2022, 09:58
Behavioral task
behavioral1
Sample
HDFC Tax Payment Confirmation.exe
Resource
win7-20220812-en
General
-
Target
HDFC Tax Payment Confirmation.exe
-
Size
544KB
-
MD5
4d99bb4a8d588039573908a4cb9c1f5d
-
SHA1
15feba0a4ad53bdb7135fd58de01dee088301646
-
SHA256
b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
-
SHA512
1884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda
-
SSDEEP
6144:M8ylUOltoMFD95ad/gvlfZPFHrbl3wL0n9/G0GM5JLMKRMWBXd+tPdvcW4Es+CSE:j2YcJmW/+bcB4/8vYjDpK8atfx8hDu
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0008000000009db3-137.dat family_kutaki behavioral2/files/0x0008000000009db3-138.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 432 ch.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe HDFC Tax Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe HDFC Tax Payment Confirmation.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 mspaint.exe 2144 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 376 HDFC Tax Payment Confirmation.exe 376 HDFC Tax Payment Confirmation.exe 376 HDFC Tax Payment Confirmation.exe 2144 mspaint.exe 2144 mspaint.exe 2144 mspaint.exe 2144 mspaint.exe 432 ch.exe 432 ch.exe 432 ch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 376 wrote to memory of 4824 376 HDFC Tax Payment Confirmation.exe 79 PID 376 wrote to memory of 4824 376 HDFC Tax Payment Confirmation.exe 79 PID 376 wrote to memory of 4824 376 HDFC Tax Payment Confirmation.exe 79 PID 4824 wrote to memory of 2144 4824 cmd.exe 81 PID 4824 wrote to memory of 2144 4824 cmd.exe 81 PID 4824 wrote to memory of 2144 4824 cmd.exe 81 PID 376 wrote to memory of 432 376 HDFC Tax Payment Confirmation.exe 87 PID 376 wrote to memory of 432 376 HDFC Tax Payment Confirmation.exe 87 PID 376 wrote to memory of 432 376 HDFC Tax Payment Confirmation.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\HDFC Tax Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\HDFC Tax Payment Confirmation.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD54d99bb4a8d588039573908a4cb9c1f5d
SHA115feba0a4ad53bdb7135fd58de01dee088301646
SHA256b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
SHA5121884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda
-
Filesize
544KB
MD54d99bb4a8d588039573908a4cb9c1f5d
SHA115feba0a4ad53bdb7135fd58de01dee088301646
SHA256b515657198d14112d9fd991fc5147cb8ca68050bf948669548e4d7998f76e9b6
SHA5121884646b44413a603c8ca2ce186d04e32456c693676e1949f38bcae21732c0428aeef412ac6202a199f7ab4a48c2cbde923ae4ea9917fb289aa9aee1b8ea9cda