Analysis
-
max time kernel
137s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08/12/2022, 09:04
Behavioral task
behavioral1
Sample
jmt.exe
Resource
win7-20221111-en
General
-
Target
jmt.exe
-
Size
629KB
-
MD5
79203689b5f7811d9215a51c7d8ca106
-
SHA1
97137de64f6d4f8e7d2ae769024ee4053bb3058e
-
SHA256
9a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
-
SHA512
fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
SSDEEP
12288:diwaCECK5cldtdlEqDPylAwl46A9jmP/uhu/yMS08CkntxYRvL:qCED5cldtdPDgAw+fmP/UDMS08Ckn32
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012311-59.dat family_kutaki behavioral1/files/0x0009000000012311-60.dat family_kutaki behavioral1/files/0x0009000000012311-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1944 pndwnvfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pndwnvfk.exe jmt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pndwnvfk.exe jmt.exe -
Loads dropped DLL 2 IoCs
pid Process 1508 jmt.exe 1508 jmt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 628 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1508 jmt.exe 1508 jmt.exe 1508 jmt.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe 1944 pndwnvfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 568 1508 jmt.exe 29 PID 1508 wrote to memory of 568 1508 jmt.exe 29 PID 1508 wrote to memory of 568 1508 jmt.exe 29 PID 1508 wrote to memory of 568 1508 jmt.exe 29 PID 1508 wrote to memory of 1944 1508 jmt.exe 31 PID 1508 wrote to memory of 1944 1508 jmt.exe 31 PID 1508 wrote to memory of 1944 1508 jmt.exe 31 PID 1508 wrote to memory of 1944 1508 jmt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\jmt.exe"C:\Users\Admin\AppData\Local\Temp\jmt.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:568
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pndwnvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pndwnvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba
-
Filesize
629KB
MD579203689b5f7811d9215a51c7d8ca106
SHA197137de64f6d4f8e7d2ae769024ee4053bb3058e
SHA2569a1d08a5e847f6faf3abdbbf95388055757c544c5b792be39463b94417d9ea69
SHA512fe697e799f618dd45cd7e5d30dae3fa296303c337d1087b3a34adcc9a1b8282bd1c4d45256cbfb56d14f309464d6fc0040ebb9961e9779b890ef1748c032dcba