Analysis
-
max time kernel
147s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/11/2022, 19:49
Behavioral task
behavioral1
Sample
TMB_NEFT.exe
Resource
win7-20220812-en
General
-
Target
TMB_NEFT.exe
-
Size
2.4MB
-
MD5
c6a75de5782bf853b0d79935f482f888
-
SHA1
e15600180a75dfde9d04cd8f8d45d8339fb36e13
-
SHA256
3cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d
-
SHA512
74769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe
-
SSDEEP
49152:2kWk5cS7a+9XYaQpZehc4mTYJ78V9gyBn4coQfmP/SA8N:aajJGZ942KQV9hp4DQfmP/SA8
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000c0000000054a8-58.dat family_kutaki behavioral1/files/0x000c0000000054a8-59.dat family_kutaki behavioral1/files/0x000c0000000054a8-61.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 948 lzubybfk.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lzubybfk.exe TMB_NEFT.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lzubybfk.exe TMB_NEFT.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 TMB_NEFT.exe 1972 TMB_NEFT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1972 TMB_NEFT.exe 1972 TMB_NEFT.exe 1972 TMB_NEFT.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe 948 lzubybfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1360 1972 TMB_NEFT.exe 29 PID 1972 wrote to memory of 1360 1972 TMB_NEFT.exe 29 PID 1972 wrote to memory of 1360 1972 TMB_NEFT.exe 29 PID 1972 wrote to memory of 1360 1972 TMB_NEFT.exe 29 PID 1972 wrote to memory of 948 1972 TMB_NEFT.exe 31 PID 1972 wrote to memory of 948 1972 TMB_NEFT.exe 31 PID 1972 wrote to memory of 948 1972 TMB_NEFT.exe 31 PID 1972 wrote to memory of 948 1972 TMB_NEFT.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\TMB_NEFT.exe"C:\Users\Admin\AppData\Local\Temp\TMB_NEFT.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1360
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lzubybfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lzubybfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5c6a75de5782bf853b0d79935f482f888
SHA1e15600180a75dfde9d04cd8f8d45d8339fb36e13
SHA2563cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d
SHA51274769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe
-
Filesize
2.4MB
MD5c6a75de5782bf853b0d79935f482f888
SHA1e15600180a75dfde9d04cd8f8d45d8339fb36e13
SHA2563cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d
SHA51274769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe
-
Filesize
2.4MB
MD5c6a75de5782bf853b0d79935f482f888
SHA1e15600180a75dfde9d04cd8f8d45d8339fb36e13
SHA2563cd0709d63383d5819f979eeca64178334abf444e8a5609ab3f35f26dd30806d
SHA51274769668edc7027d26b2b77ef743544dcd73c393aa121af277d1fad68ee1902e7acce1e686f8e7f874003f73e885cd550ecdbd94a79527782b3591e28c6efebe