Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 10:30
Behavioral task
behavioral1
Sample
Tax Payment Challan.exe
Resource
win7-20230220-en
General
-
Target
Tax Payment Challan.exe
-
Size
650KB
-
MD5
f236ef2812755f787b852acd19655592
-
SHA1
5a3678b093a0dddf8bdd47be635a7c4bba97725b
-
SHA256
6cc89c4ee5308a2c40874f02f8f636bf77133c0b1bc59df8e806fda5e509424a
-
SHA512
61e5f17cc2463b1c57385c4925a82b6fb5c7ea4898e29d45c20d3953ec7059dba466038881b70a2a0f29dee936107aced84939d695718d129a8b87dffa802174
-
SSDEEP
12288:16UaeOpx41/ai46A9jmP/uhu/yMS08CkntxYRAAL:ALezaNfmP/UDMS08Ckn3K
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
resource yara_rule behavioral2/files/0x0003000000000731-139.dat family_kutaki behavioral2/files/0x0003000000000731-138.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pfubuwfk.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pfubuwfk.exe Tax Payment Challan.exe -
Executes dropped EXE 1 IoCs
pid Process 4112 pfubuwfk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 mspaint.exe 116 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2640 Tax Payment Challan.exe 2640 Tax Payment Challan.exe 2640 Tax Payment Challan.exe 4112 pfubuwfk.exe 4112 pfubuwfk.exe 4112 pfubuwfk.exe 116 mspaint.exe 116 mspaint.exe 116 mspaint.exe 116 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4116 2640 Tax Payment Challan.exe 87 PID 2640 wrote to memory of 4116 2640 Tax Payment Challan.exe 87 PID 2640 wrote to memory of 4116 2640 Tax Payment Challan.exe 87 PID 2640 wrote to memory of 4112 2640 Tax Payment Challan.exe 89 PID 2640 wrote to memory of 4112 2640 Tax Payment Challan.exe 89 PID 2640 wrote to memory of 4112 2640 Tax Payment Challan.exe 89 PID 4116 wrote to memory of 116 4116 cmd.exe 90 PID 4116 wrote to memory of 116 4116 cmd.exe 90 PID 4116 wrote to memory of 116 4116 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:116
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pfubuwfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pfubuwfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650KB
MD5f236ef2812755f787b852acd19655592
SHA15a3678b093a0dddf8bdd47be635a7c4bba97725b
SHA2566cc89c4ee5308a2c40874f02f8f636bf77133c0b1bc59df8e806fda5e509424a
SHA51261e5f17cc2463b1c57385c4925a82b6fb5c7ea4898e29d45c20d3953ec7059dba466038881b70a2a0f29dee936107aced84939d695718d129a8b87dffa802174
-
Filesize
650KB
MD5f236ef2812755f787b852acd19655592
SHA15a3678b093a0dddf8bdd47be635a7c4bba97725b
SHA2566cc89c4ee5308a2c40874f02f8f636bf77133c0b1bc59df8e806fda5e509424a
SHA51261e5f17cc2463b1c57385c4925a82b6fb5c7ea4898e29d45c20d3953ec7059dba466038881b70a2a0f29dee936107aced84939d695718d129a8b87dffa802174