Analysis
-
max time kernel
77s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/12/2022, 06:29
Behavioral task
behavioral1
Sample
Recipt.exe
Resource
win7-20220812-en
General
-
Target
Recipt.exe
-
Size
629KB
-
MD5
64b06d9408f8681bce5821db705273ce
-
SHA1
52b1e9f9859a64f71f28fd83c8fe62aa60352589
-
SHA256
5152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348
-
SHA512
7ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce
-
SSDEEP
12288:UiwaCECK5cldtdlEqDPylAwn46A9jmP/uhu/yMS08CkntxYRyL:ZCED5cldtdPDgAw4fmP/UDMS08Ckn35
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0007000000015c29-58.dat family_kutaki behavioral1/files/0x0007000000015c29-59.dat family_kutaki behavioral1/files/0x0007000000015c29-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1320 olaulvfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\olaulvfk.exe Recipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\olaulvfk.exe Recipt.exe -
Loads dropped DLL 2 IoCs
pid Process 1088 Recipt.exe 1088 Recipt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1088 Recipt.exe 1088 Recipt.exe 1088 Recipt.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe 1320 olaulvfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1944 1088 Recipt.exe 28 PID 1088 wrote to memory of 1944 1088 Recipt.exe 28 PID 1088 wrote to memory of 1944 1088 Recipt.exe 28 PID 1088 wrote to memory of 1944 1088 Recipt.exe 28 PID 1088 wrote to memory of 1320 1088 Recipt.exe 30 PID 1088 wrote to memory of 1320 1088 Recipt.exe 30 PID 1088 wrote to memory of 1320 1088 Recipt.exe 30 PID 1088 wrote to memory of 1320 1088 Recipt.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Recipt.exe"C:\Users\Admin\AppData\Local\Temp\Recipt.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1944
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\olaulvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\olaulvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD564b06d9408f8681bce5821db705273ce
SHA152b1e9f9859a64f71f28fd83c8fe62aa60352589
SHA2565152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348
SHA5127ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce
-
Filesize
629KB
MD564b06d9408f8681bce5821db705273ce
SHA152b1e9f9859a64f71f28fd83c8fe62aa60352589
SHA2565152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348
SHA5127ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce
-
Filesize
629KB
MD564b06d9408f8681bce5821db705273ce
SHA152b1e9f9859a64f71f28fd83c8fe62aa60352589
SHA2565152a2dee24714603552cf873e34a12b8822df103336e8f0e1da5379720c7348
SHA5127ec1ad8d8b02d0b9c0fbd63317211288d71123e3c5c9f2df646ad5b5a8f0cf8006ee357ff288ea793981fbde141126ec18fb44786b5d6bda62b0309b9fce84ce