Analysis
-
max time kernel
155s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2022, 09:05
Behavioral task
behavioral1
Sample
jmt.exe
Resource
win7-20220812-en
General
-
Target
jmt.exe
-
Size
629KB
-
MD5
79203689b5f7811d9215a51c7d8ca106
-
SHA1
97137de64f6d4f8e7d2ae769024ee4053bb3058e
-
SHA256
9a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
-
SHA512
fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
SSDEEP
12288:diwaCECK5cldtdlEqDPylAwl46A9jmP/uhu/yMS08CkntxYRvL:qCED5cldtdPDgAw+fmP/UDMS08Ckn32
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x000500000001d9f5-138.dat family_kutaki behavioral2/files/0x000500000001d9f5-139.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3892 rxyxlsfk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rxyxlsfk.exe jmt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rxyxlsfk.exe jmt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1888 mspaint.exe 1888 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3064 jmt.exe 3064 jmt.exe 3064 jmt.exe 1888 mspaint.exe 1888 mspaint.exe 1888 mspaint.exe 1888 mspaint.exe 3892 rxyxlsfk.exe 3892 rxyxlsfk.exe 3892 rxyxlsfk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1352 3064 jmt.exe 81 PID 3064 wrote to memory of 1352 3064 jmt.exe 81 PID 3064 wrote to memory of 1352 3064 jmt.exe 81 PID 1352 wrote to memory of 1888 1352 cmd.exe 83 PID 1352 wrote to memory of 1888 1352 cmd.exe 83 PID 1352 wrote to memory of 1888 1352 cmd.exe 83 PID 3064 wrote to memory of 3892 3064 jmt.exe 89 PID 3064 wrote to memory of 3892 3064 jmt.exe 89 PID 3064 wrote to memory of 3892 3064 jmt.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\jmt.exe"C:\Users\Admin\AppData\Local\Temp\jmt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rxyxlsfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rxyxlsfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba