Analysis
-
max time kernel
148s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 09:59
Behavioral task
behavioral1
Sample
a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe
Resource
win7-20230220-en
General
-
Target
a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe
-
Size
2.4MB
-
MD5
fe87505c13a6a986885193cb177d4607
-
SHA1
8d11c69147d8fce75c714d0f7de6a26415facda0
-
SHA256
a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
-
SHA512
246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
SSDEEP
49152:hlkWk5cS7a+9XYaQHZehc4mTYJ78V9gyBn4cbfmP/SA8N:3ajJ4Z942KQV9hp4UfmP/SA8
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwxmodfk.exe a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwxmodfk.exe a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 kwxmodfk.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe 1668 kwxmodfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1688 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 28 PID 1656 wrote to memory of 1688 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 28 PID 1656 wrote to memory of 1688 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 28 PID 1656 wrote to memory of 1688 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 28 PID 1656 wrote to memory of 1668 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 30 PID 1656 wrote to memory of 1668 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 30 PID 1656 wrote to memory of 1668 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 30 PID 1656 wrote to memory of 1668 1656 a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe"C:\Users\Admin\AppData\Local\Temp\a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1688
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwxmodfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kwxmodfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb
-
Filesize
2.4MB
MD5fe87505c13a6a986885193cb177d4607
SHA18d11c69147d8fce75c714d0f7de6a26415facda0
SHA256a7f37926eb21924303d17007e8dd4d87c0bb428d1663a86d24d1ca38442ef845
SHA512246854ff69ac1d6c6a734f8243c6a9b20ffd00265a00f5c1230db7ba2e73580af920fe8e8a0402c34da658bc8967b557a9be853bde9c4c1319e9c1a420a2a6fb