Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 13:18
Behavioral task
behavioral1
Sample
IncomeTaxPaymentChallan.exe
Resource
win7-20220812-en
General
-
Target
IncomeTaxPaymentChallan.exe
-
Size
737KB
-
MD5
97f31e6d14a85c59b121126c5732d4d7
-
SHA1
2e04c17a218c45552e3127fadb7eab45e138e83a
-
SHA256
037a3742bb8812078421e1b8e822d1e358cb3fccaa3d3fc2cd67d99d303e958f
-
SHA512
a7bf2db806a27dffc82346ca03c503f567216692698f840cc16ba544d7c3c7edf590b2941c2a3c0b38424e48479de40859d2c60b7269e5764f25c277d49544cf
-
SSDEEP
12288:/4y86ukvYbVYb3YM5YdTT6WYuazYB46A9jmP/uhu/yMS08CkntxYR3VOL:/Xdvb3YM5Nzy6fmP/UDMS08Ckn3H
Malware Config
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000900000001da19-136.dat family_kutaki behavioral2/files/0x000900000001da19-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 2216 vzwuxvfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vzwuxvfk.exe IncomeTaxPaymentChallan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vzwuxvfk.exe IncomeTaxPaymentChallan.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4956 IncomeTaxPaymentChallan.exe 4956 IncomeTaxPaymentChallan.exe 4956 IncomeTaxPaymentChallan.exe 2216 vzwuxvfk.exe 2216 vzwuxvfk.exe 2216 vzwuxvfk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1448 4956 IncomeTaxPaymentChallan.exe 80 PID 4956 wrote to memory of 1448 4956 IncomeTaxPaymentChallan.exe 80 PID 4956 wrote to memory of 1448 4956 IncomeTaxPaymentChallan.exe 80 PID 4956 wrote to memory of 2216 4956 IncomeTaxPaymentChallan.exe 83 PID 4956 wrote to memory of 2216 4956 IncomeTaxPaymentChallan.exe 83 PID 4956 wrote to memory of 2216 4956 IncomeTaxPaymentChallan.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\IncomeTaxPaymentChallan.exe"C:\Users\Admin\AppData\Local\Temp\IncomeTaxPaymentChallan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1448
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vzwuxvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vzwuxvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
737KB
MD597f31e6d14a85c59b121126c5732d4d7
SHA12e04c17a218c45552e3127fadb7eab45e138e83a
SHA256037a3742bb8812078421e1b8e822d1e358cb3fccaa3d3fc2cd67d99d303e958f
SHA512a7bf2db806a27dffc82346ca03c503f567216692698f840cc16ba544d7c3c7edf590b2941c2a3c0b38424e48479de40859d2c60b7269e5764f25c277d49544cf
-
Filesize
737KB
MD597f31e6d14a85c59b121126c5732d4d7
SHA12e04c17a218c45552e3127fadb7eab45e138e83a
SHA256037a3742bb8812078421e1b8e822d1e358cb3fccaa3d3fc2cd67d99d303e958f
SHA512a7bf2db806a27dffc82346ca03c503f567216692698f840cc16ba544d7c3c7edf590b2941c2a3c0b38424e48479de40859d2c60b7269e5764f25c277d49544cf