Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 19:47
Behavioral task
behavioral1
Sample
4710472a59fc98d7368b3aa1b719f024.exe
Resource
win7-20221111-en
General
-
Target
4710472a59fc98d7368b3aa1b719f024.exe
-
Size
453KB
-
MD5
4710472a59fc98d7368b3aa1b719f024
-
SHA1
f37094d763df983afce0ab20b49cc4afda0abedc
-
SHA256
2c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a
-
SHA512
ea798060fdc5368815b8cfa68892b6799dedae3354fe6bf8712a1c26b6c7281ea29bef50b2a63ef1d9eaa1dc517842059060eef60a58bc0aa025b9d0caa60ebb
-
SSDEEP
12288:8U4Tisi646A9jmP/uhu/yMS08CkntxYR/L:rDsufmP/UDMS08Ckn3C
Malware Config
Extracted
kutaki
http://newbosslink.xyz/baba/new4.php
Signatures
-
Kutaki Executable 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012738-58.dat family_kutaki behavioral1/files/0x0009000000012738-59.dat family_kutaki behavioral1/files/0x0009000000012738-62.dat family_kutaki -
Executes dropped EXE 1 IoCs
pid Process 1504 vrxjlyfk.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vrxjlyfk.exe 4710472a59fc98d7368b3aa1b719f024.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vrxjlyfk.exe 4710472a59fc98d7368b3aa1b719f024.exe -
Loads dropped DLL 2 IoCs
pid Process 1232 4710472a59fc98d7368b3aa1b719f024.exe 1232 4710472a59fc98d7368b3aa1b719f024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 324 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1232 4710472a59fc98d7368b3aa1b719f024.exe 1232 4710472a59fc98d7368b3aa1b719f024.exe 1232 4710472a59fc98d7368b3aa1b719f024.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe 1504 vrxjlyfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1232 wrote to memory of 524 1232 4710472a59fc98d7368b3aa1b719f024.exe 29 PID 1232 wrote to memory of 524 1232 4710472a59fc98d7368b3aa1b719f024.exe 29 PID 1232 wrote to memory of 524 1232 4710472a59fc98d7368b3aa1b719f024.exe 29 PID 1232 wrote to memory of 524 1232 4710472a59fc98d7368b3aa1b719f024.exe 29 PID 1232 wrote to memory of 1504 1232 4710472a59fc98d7368b3aa1b719f024.exe 31 PID 1232 wrote to memory of 1504 1232 4710472a59fc98d7368b3aa1b719f024.exe 31 PID 1232 wrote to memory of 1504 1232 4710472a59fc98d7368b3aa1b719f024.exe 31 PID 1232 wrote to memory of 1504 1232 4710472a59fc98d7368b3aa1b719f024.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4710472a59fc98d7368b3aa1b719f024.exe"C:\Users\Admin\AppData\Local\Temp\4710472a59fc98d7368b3aa1b719f024.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:524
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vrxjlyfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vrxjlyfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
453KB
MD54710472a59fc98d7368b3aa1b719f024
SHA1f37094d763df983afce0ab20b49cc4afda0abedc
SHA2562c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a
SHA512ea798060fdc5368815b8cfa68892b6799dedae3354fe6bf8712a1c26b6c7281ea29bef50b2a63ef1d9eaa1dc517842059060eef60a58bc0aa025b9d0caa60ebb
-
Filesize
453KB
MD54710472a59fc98d7368b3aa1b719f024
SHA1f37094d763df983afce0ab20b49cc4afda0abedc
SHA2562c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a
SHA512ea798060fdc5368815b8cfa68892b6799dedae3354fe6bf8712a1c26b6c7281ea29bef50b2a63ef1d9eaa1dc517842059060eef60a58bc0aa025b9d0caa60ebb
-
Filesize
453KB
MD54710472a59fc98d7368b3aa1b719f024
SHA1f37094d763df983afce0ab20b49cc4afda0abedc
SHA2562c72daa02805c43f5a35ebca409ad1ddcad3c4b244a9a0579d529b722fea9e6a
SHA512ea798060fdc5368815b8cfa68892b6799dedae3354fe6bf8712a1c26b6c7281ea29bef50b2a63ef1d9eaa1dc517842059060eef60a58bc0aa025b9d0caa60ebb