Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 15:00
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20221111-en
General
-
Target
Payment Confirmation.exe
-
Size
621KB
-
MD5
7558689ffc3f6a0da8e35d8f257c86bb
-
SHA1
40b520982a8e9e79c39eec75d3b62d685b8946e5
-
SHA256
ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
-
SHA512
acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401
-
SSDEEP
12288:/GDq0pDRbx37mEZBVlUvE46A9jmP/uhu/yMS08CkntxYRXL:/GDq05R1rmEZBQfmP/UDMS08Ckn3y
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0006000000022e37-136.dat family_kutaki behavioral2/files/0x0006000000022e37-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 4496 tgfljtfk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tgfljtfk.exe Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tgfljtfk.exe Payment Confirmation.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 mspaint.exe 2576 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4800 Payment Confirmation.exe 4800 Payment Confirmation.exe 4800 Payment Confirmation.exe 4496 tgfljtfk.exe 4496 tgfljtfk.exe 4496 tgfljtfk.exe 2576 mspaint.exe 2576 mspaint.exe 2576 mspaint.exe 2576 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4320 4800 Payment Confirmation.exe 82 PID 4800 wrote to memory of 4320 4800 Payment Confirmation.exe 82 PID 4800 wrote to memory of 4320 4800 Payment Confirmation.exe 82 PID 4800 wrote to memory of 4496 4800 Payment Confirmation.exe 84 PID 4800 wrote to memory of 4496 4800 Payment Confirmation.exe 84 PID 4800 wrote to memory of 4496 4800 Payment Confirmation.exe 84 PID 4320 wrote to memory of 2576 4320 cmd.exe 85 PID 4320 wrote to memory of 2576 4320 cmd.exe 85 PID 4320 wrote to memory of 2576 4320 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tgfljtfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tgfljtfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621KB
MD57558689ffc3f6a0da8e35d8f257c86bb
SHA140b520982a8e9e79c39eec75d3b62d685b8946e5
SHA256ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
SHA512acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401
-
Filesize
621KB
MD57558689ffc3f6a0da8e35d8f257c86bb
SHA140b520982a8e9e79c39eec75d3b62d685b8946e5
SHA256ed8534bd6aa40b9c0af7f68fe82154b3e7f0a82ecb05189a2de9884521f963a5
SHA512acd8e620abdd36c822245afbe87f27d554a111054ed434b8d03dd11e6ac2fd6ac8613a210b0bc4697738b73b0c6119a3d0d42671d67f1ecdea393beafd6ca401