Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2023 08:14
Behavioral task
behavioral1
Sample
7ff7b7eedc089b658ba80ec8cb0748f9.exe
Resource
win7-20221111-en
General
-
Target
7ff7b7eedc089b658ba80ec8cb0748f9.exe
-
Size
453KB
-
MD5
7ff7b7eedc089b658ba80ec8cb0748f9
-
SHA1
1840814d053eb5327e68db983215316008e84bdb
-
SHA256
1a3baff7083619571a375795049718bc745e555a25ea3e248848c536671fef35
-
SHA512
5c370ad1314d4d0c66aad6518b93ecba45835766feabd26bada33e6b6aa4ba68ff766257db0f91f2643a680fbbf061bf99185dfc5e55fec20a9e86c7256b4472
-
SSDEEP
12288:+U4Tisi246A9jmP/uhu/yMS08CkntxYRPL:lDsKfmP/UDMS08Ckn3K
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0009000000022f52-136.dat family_kutaki behavioral2/files/0x0009000000022f52-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3624 zbdjegfk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zbdjegfk.exe 7ff7b7eedc089b658ba80ec8cb0748f9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zbdjegfk.exe 7ff7b7eedc089b658ba80ec8cb0748f9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4308 mspaint.exe 4308 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 3624 zbdjegfk.exe 3624 zbdjegfk.exe 3624 zbdjegfk.exe 4308 mspaint.exe 4308 mspaint.exe 4308 mspaint.exe 4308 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4324 wrote to memory of 5016 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 80 PID 4324 wrote to memory of 5016 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 80 PID 4324 wrote to memory of 5016 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 80 PID 4324 wrote to memory of 3624 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 82 PID 4324 wrote to memory of 3624 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 82 PID 4324 wrote to memory of 3624 4324 7ff7b7eedc089b658ba80ec8cb0748f9.exe 82 PID 5016 wrote to memory of 4308 5016 cmd.exe 83 PID 5016 wrote to memory of 4308 5016 cmd.exe 83 PID 5016 wrote to memory of 4308 5016 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ff7b7eedc089b658ba80ec8cb0748f9.exe"C:\Users\Admin\AppData\Local\Temp\7ff7b7eedc089b658ba80ec8cb0748f9.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4308
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zbdjegfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zbdjegfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
453KB
MD57ff7b7eedc089b658ba80ec8cb0748f9
SHA11840814d053eb5327e68db983215316008e84bdb
SHA2561a3baff7083619571a375795049718bc745e555a25ea3e248848c536671fef35
SHA5125c370ad1314d4d0c66aad6518b93ecba45835766feabd26bada33e6b6aa4ba68ff766257db0f91f2643a680fbbf061bf99185dfc5e55fec20a9e86c7256b4472
-
Filesize
453KB
MD57ff7b7eedc089b658ba80ec8cb0748f9
SHA11840814d053eb5327e68db983215316008e84bdb
SHA2561a3baff7083619571a375795049718bc745e555a25ea3e248848c536671fef35
SHA5125c370ad1314d4d0c66aad6518b93ecba45835766feabd26bada33e6b6aa4ba68ff766257db0f91f2643a680fbbf061bf99185dfc5e55fec20a9e86c7256b4472