Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/11/2022, 13:10
Behavioral task
behavioral1
Sample
NEFT_Payment.exe
Resource
win7-20220812-en
General
-
Target
NEFT_Payment.exe
-
Size
2.3MB
-
MD5
d61dd474340f39a91ae57cfd1c997fb0
-
SHA1
22586db543f8770c767ed89c62d7352e80620d8d
-
SHA256
4ca11aff38d3d7b79a6ee372e8aab8ac38157965f975f8540065bc67bc116824
-
SHA512
2df78e05dac0142ce18eb78d0c15f0e7ffcc9a26231603f5ddda6de53d9a17dc7fd0bc55bfeb245e791b5c87e22a0b6dea81b9a830373a41ffe2586cd7f19108
-
SSDEEP
49152:FlkWk5cS7a+9XYaQhZehc4mTYJ78V9gyBn4cMfmP/SA8N:rajJaZ942KQV9hp47fmP/SA8
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000c0000000054a8-58.dat family_kutaki behavioral1/files/0x000c0000000054a8-59.dat family_kutaki behavioral1/files/0x000c0000000054a8-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1772 voumxafk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\voumxafk.exe NEFT_Payment.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\voumxafk.exe NEFT_Payment.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 NEFT_Payment.exe 1972 NEFT_Payment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1972 NEFT_Payment.exe 1972 NEFT_Payment.exe 1972 NEFT_Payment.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe 1772 voumxafk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1776 1972 NEFT_Payment.exe 29 PID 1972 wrote to memory of 1776 1972 NEFT_Payment.exe 29 PID 1972 wrote to memory of 1776 1972 NEFT_Payment.exe 29 PID 1972 wrote to memory of 1776 1972 NEFT_Payment.exe 29 PID 1972 wrote to memory of 1772 1972 NEFT_Payment.exe 31 PID 1972 wrote to memory of 1772 1972 NEFT_Payment.exe 31 PID 1972 wrote to memory of 1772 1972 NEFT_Payment.exe 31 PID 1972 wrote to memory of 1772 1972 NEFT_Payment.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEFT_Payment.exe"C:\Users\Admin\AppData\Local\Temp\NEFT_Payment.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1776
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\voumxafk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\voumxafk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5d61dd474340f39a91ae57cfd1c997fb0
SHA122586db543f8770c767ed89c62d7352e80620d8d
SHA2564ca11aff38d3d7b79a6ee372e8aab8ac38157965f975f8540065bc67bc116824
SHA5122df78e05dac0142ce18eb78d0c15f0e7ffcc9a26231603f5ddda6de53d9a17dc7fd0bc55bfeb245e791b5c87e22a0b6dea81b9a830373a41ffe2586cd7f19108
-
Filesize
2.3MB
MD5d61dd474340f39a91ae57cfd1c997fb0
SHA122586db543f8770c767ed89c62d7352e80620d8d
SHA2564ca11aff38d3d7b79a6ee372e8aab8ac38157965f975f8540065bc67bc116824
SHA5122df78e05dac0142ce18eb78d0c15f0e7ffcc9a26231603f5ddda6de53d9a17dc7fd0bc55bfeb245e791b5c87e22a0b6dea81b9a830373a41ffe2586cd7f19108
-
Filesize
2.3MB
MD5d61dd474340f39a91ae57cfd1c997fb0
SHA122586db543f8770c767ed89c62d7352e80620d8d
SHA2564ca11aff38d3d7b79a6ee372e8aab8ac38157965f975f8540065bc67bc116824
SHA5122df78e05dac0142ce18eb78d0c15f0e7ffcc9a26231603f5ddda6de53d9a17dc7fd0bc55bfeb245e791b5c87e22a0b6dea81b9a830373a41ffe2586cd7f19108