Analysis

  • max time kernel
    153s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/10/2022, 10:15

General

  • Target

    INCOMETAX_CHALLAN_COPY.exe

  • Size

    1.4MB

  • MD5

    702bb8f393cc2dba7181b407175c2d20

  • SHA1

    5ede8da72c0e18a528edc56c5fb254f894a1aec0

  • SHA256

    5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

  • SHA512

    d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

  • SSDEEP

    24576:1Sy4uqCSN5l3ksJb7tb1Fdv11KfmP/UDMS08Ckn3f:wyMlafmP/SA8NP

Malware Config

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Kutaki Executable 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INCOMETAX_CHALLAN_COPY.exe
    "C:\Users\Admin\AppData\Local\Temp\INCOMETAX_CHALLAN_COPY.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:1236
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe

      Filesize

      1.4MB

      MD5

      702bb8f393cc2dba7181b407175c2d20

      SHA1

      5ede8da72c0e18a528edc56c5fb254f894a1aec0

      SHA256

      5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

      SHA512

      d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe

      Filesize

      1.4MB

      MD5

      702bb8f393cc2dba7181b407175c2d20

      SHA1

      5ede8da72c0e18a528edc56c5fb254f894a1aec0

      SHA256

      5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

      SHA512

      d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe

      Filesize

      1.4MB

      MD5

      702bb8f393cc2dba7181b407175c2d20

      SHA1

      5ede8da72c0e18a528edc56c5fb254f894a1aec0

      SHA256

      5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

      SHA512

      d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\klswxyfk.exe

      Filesize

      1.4MB

      MD5

      702bb8f393cc2dba7181b407175c2d20

      SHA1

      5ede8da72c0e18a528edc56c5fb254f894a1aec0

      SHA256

      5ab0fd363096157c4a3ae912e126b20c7d31d15887b3c0c04a90b6b4d1a2f03b

      SHA512

      d951434277bc2e4a761fc8ad504bafeaf8e98921d5dc011ceabe3aa3fc36ce0fd06c75d7f10703483a655c80f3ceead706c65330ca94df92c8051abb1e2143ce

    • memory/960-65-0x0000000004231000-0x00000000050DD000-memory.dmp

      Filesize

      14.7MB

    • memory/1916-56-0x0000000075C51000-0x0000000075C53000-memory.dmp

      Filesize

      8KB