Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 09:14
Behavioral task
behavioral1
Sample
Receipt.exe
Resource
win7-20220901-en
General
-
Target
Receipt.exe
-
Size
521KB
-
MD5
3c44c9045db8891afbd59a812a5a535b
-
SHA1
cadb3a94b3a84b6d375b9f3225973a2aff690642
-
SHA256
2b230a2d05aeb0a05373055d4cef9d25450779b60d7cf8a399ac2b4b373df5a7
-
SHA512
78a7ce8b53a97d9c06c8a447db8478bf42400e3c2c4bd8206c1859c2538a9e35fb4dcb75767df179e34229f4ee2c9ec39670ad0b1503e5b46f2bb9d7f83d644f
-
SSDEEP
12288:+j1IXFF+ylEzw46A9jmP/uhu/yMS08CkntxYRnL:wIXFgXfmP/UDMS08Ckn3K
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0007000000022f46-136.dat family_kutaki behavioral2/files/0x0007000000022f46-137.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 3924 apsmpxfk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apsmpxfk.exe Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apsmpxfk.exe Receipt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3084 mspaint.exe 3084 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3496 Receipt.exe 3496 Receipt.exe 3496 Receipt.exe 3924 apsmpxfk.exe 3924 apsmpxfk.exe 3924 apsmpxfk.exe 3084 mspaint.exe 3084 mspaint.exe 3084 mspaint.exe 3084 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3496 wrote to memory of 4332 3496 Receipt.exe 80 PID 3496 wrote to memory of 4332 3496 Receipt.exe 80 PID 3496 wrote to memory of 4332 3496 Receipt.exe 80 PID 3496 wrote to memory of 3924 3496 Receipt.exe 82 PID 3496 wrote to memory of 3924 3496 Receipt.exe 82 PID 3496 wrote to memory of 3924 3496 Receipt.exe 82 PID 4332 wrote to memory of 3084 4332 cmd.exe 83 PID 4332 wrote to memory of 3084 4332 cmd.exe 83 PID 4332 wrote to memory of 3084 4332 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3084
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apsmpxfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apsmpxfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD53c44c9045db8891afbd59a812a5a535b
SHA1cadb3a94b3a84b6d375b9f3225973a2aff690642
SHA2562b230a2d05aeb0a05373055d4cef9d25450779b60d7cf8a399ac2b4b373df5a7
SHA51278a7ce8b53a97d9c06c8a447db8478bf42400e3c2c4bd8206c1859c2538a9e35fb4dcb75767df179e34229f4ee2c9ec39670ad0b1503e5b46f2bb9d7f83d644f
-
Filesize
521KB
MD53c44c9045db8891afbd59a812a5a535b
SHA1cadb3a94b3a84b6d375b9f3225973a2aff690642
SHA2562b230a2d05aeb0a05373055d4cef9d25450779b60d7cf8a399ac2b4b373df5a7
SHA51278a7ce8b53a97d9c06c8a447db8478bf42400e3c2c4bd8206c1859c2538a9e35fb4dcb75767df179e34229f4ee2c9ec39670ad0b1503e5b46f2bb9d7f83d644f