Analysis
-
max time kernel
96s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13/01/2023, 15:00
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20221111-en
General
-
Target
Payment Confirmation.exe
-
Size
621KB
-
MD5
7558689ffc3f6a0da8e35d8f257c86bb
-
SHA1
40b520982a8e9e79c39eec75d3b62d685b8946e5
-
SHA256
ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
-
SHA512
acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401
-
SSDEEP
12288:/GDq0pDRbx37mEZBVlUvE46A9jmP/uhu/yMS08CkntxYRXL:/GDq05R1rmEZBQfmP/UDMS08Ckn3y
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x000900000001267d-62.dat family_kutaki behavioral1/files/0x000900000001267d-59.dat family_kutaki behavioral1/files/0x000900000001267d-58.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 592 fvsdjmfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvsdjmfk.exe Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvsdjmfk.exe Payment Confirmation.exe -
Loads dropped DLL 2 IoCs
pid Process 1748 Payment Confirmation.exe 1748 Payment Confirmation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1748 Payment Confirmation.exe 1748 Payment Confirmation.exe 1748 Payment Confirmation.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe 592 fvsdjmfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1528 1748 Payment Confirmation.exe 29 PID 1748 wrote to memory of 1528 1748 Payment Confirmation.exe 29 PID 1748 wrote to memory of 1528 1748 Payment Confirmation.exe 29 PID 1748 wrote to memory of 1528 1748 Payment Confirmation.exe 29 PID 1748 wrote to memory of 592 1748 Payment Confirmation.exe 31 PID 1748 wrote to memory of 592 1748 Payment Confirmation.exe 31 PID 1748 wrote to memory of 592 1748 Payment Confirmation.exe 31 PID 1748 wrote to memory of 592 1748 Payment Confirmation.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:1528
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvsdjmfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvsdjmfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621KB
MD57558689ffc3f6a0da8e35d8f257c86bb
SHA140b520982a8e9e79c39eec75d3b62d685b8946e5
SHA256ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
SHA512acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401
-
Filesize
621KB
MD57558689ffc3f6a0da8e35d8f257c86bb
SHA140b520982a8e9e79c39eec75d3b62d685b8946e5
SHA256ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
SHA512acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401
-
Filesize
621KB
MD57558689ffc3f6a0da8e35d8f257c86bb
SHA140b520982a8e9e79c39eec75d3b62d685b8946e5
SHA256ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
SHA512acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401