Analysis
-
max time kernel
120s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/12/2022, 09:05
Behavioral task
behavioral1
Sample
jmt.exe
Resource
win7-20220812-en
General
-
Target
jmt.exe
-
Size
629KB
-
MD5
79203689b5f7811d9215a51c7d8ca106
-
SHA1
97137de64f6d4f8e7d2ae769024ee4053bb3058e
-
SHA256
9a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
-
SHA512
fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
SSDEEP
12288:diwaCECK5cldtdlEqDPylAwl46A9jmP/uhu/yMS08CkntxYRvL:qCED5cldtdPDgAw+fmP/UDMS08Ckn32
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x00070000000146a2-58.dat family_kutaki behavioral1/files/0x00070000000146a2-59.dat family_kutaki behavioral1/files/0x00070000000146a2-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1760 unokppfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unokppfk.exe jmt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unokppfk.exe jmt.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 jmt.exe 1028 jmt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1028 jmt.exe 1028 jmt.exe 1028 jmt.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe 1760 unokppfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1724 1028 jmt.exe 28 PID 1028 wrote to memory of 1724 1028 jmt.exe 28 PID 1028 wrote to memory of 1724 1028 jmt.exe 28 PID 1028 wrote to memory of 1724 1028 jmt.exe 28 PID 1028 wrote to memory of 1760 1028 jmt.exe 30 PID 1028 wrote to memory of 1760 1028 jmt.exe 30 PID 1028 wrote to memory of 1760 1028 jmt.exe 30 PID 1028 wrote to memory of 1760 1028 jmt.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\jmt.exe"C:\Users\Admin\AppData\Local\Temp\jmt.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unokppfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unokppfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba