Analysis
-
max time kernel
54s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-04-2023 20:36
Behavioral task
behavioral1
Sample
Payment_Copy.exe
Resource
win7-20230220-en
General
-
Target
Payment_Copy.exe
-
Size
2.4MB
-
MD5
fe87505c13a6a986885193cb177d4607
-
SHA1
8d11c69147d8fce75c714d0f7de6a26415facda0
-
SHA256
a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
-
SHA512
246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
SSDEEP
49152:hlkWk5cS7a+9XYaQHZehc4mTYJ78V9gyBn4cbfmP/SA8N:3ajJ4Z942KQV9hp4UfmP/SA8
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txlfnrfk.exe Payment_Copy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txlfnrfk.exe Payment_Copy.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 txlfnrfk.exe -
Loads dropped DLL 2 IoCs
pid Process 628 Payment_Copy.exe 628 Payment_Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 628 Payment_Copy.exe 628 Payment_Copy.exe 628 Payment_Copy.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe 1072 txlfnrfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 628 wrote to memory of 2000 628 Payment_Copy.exe 27 PID 628 wrote to memory of 2000 628 Payment_Copy.exe 27 PID 628 wrote to memory of 2000 628 Payment_Copy.exe 27 PID 628 wrote to memory of 2000 628 Payment_Copy.exe 27 PID 628 wrote to memory of 1072 628 Payment_Copy.exe 29 PID 628 wrote to memory of 1072 628 Payment_Copy.exe 29 PID 628 wrote to memory of 1072 628 Payment_Copy.exe 29 PID 628 wrote to memory of 1072 628 Payment_Copy.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment_Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Copy.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txlfnrfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\txlfnrfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb