Analysis

  • max time kernel
    66s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-06-2023 17:46

General

  • Target

    jti.htm

  • Size

    178B

  • MD5

    ac177a6112a773d9272aa38384fb9a9b

  • SHA1

    3d4e24049a3d93ca546ef482c60db7e529cedf18

  • SHA256

    505a208666ea25c3a9dad0898c6fd52debdbdb7893f41c3f0898d96b13745be7

  • SHA512

    a14945e65d0e76fe8d37173df9ac794bd09b760e854a6f0ec839e50e9d5783124b418b7d8088fbd6fb822c7214453e7e4f4a745c66ba6c4514b855034fbeac2e

Malware Config

Extracted

Family

kutaki

C2

http://linkwotowoto.club/new/two.php

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Kutaki Executable 4 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jti.htm
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:332
  • C:\Users\Admin\Downloads\TDS\TDS.exe
    "C:\Users\Admin\Downloads\TDS\TDS.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp
      2⤵
        PID:800
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1016
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1168

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      86e9af090a7bbb7929014f2459e9f2cf

      SHA1

      26b738b0ba2fb2b00a9d1458b41589b9fd5cabdb

      SHA256

      124d30d1754d25dc18658a696ea2876f52aa7146aecae7e42b2aed877abb15e6

      SHA512

      7727807633185b01ebbfbd00c7e75139fc922465a33c1f016f7fa98585a75af37881a2eb33c16405b0ef3ea6e878b4ea33e011ff5d0cd4e01bd6fae1802ea6da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      4a9ebf257aa45584cf501731599a1427

      SHA1

      8e6da8e42281e16a8275ea9027ab1c036364bd15

      SHA256

      e46e6f6de8d573c006a47e5f708338c11fbd4579f1590f1c51c322d71a882c92

      SHA512

      1fa49ae4f548a02c995a68bfe2a71ea9dbf15759847dcddc335e274efb6e7e7fcc1d6b3202587ca489a63c9a61b4374a5eae95c6adaa0a8c88ce6d7e92ef507a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      6c9992c6caa4bb9311c6116f0fb8d562

      SHA1

      e3967fe26fab0c0e9f2a10eb3614a4e763196cf4

      SHA256

      951f451be2fe200ec1d2a08ee42cbc5fe8845e92304ae9d83be00f2512c26c92

      SHA512

      5b19f166fd138e96c055060582f1d4c2c323a086272196138bf7dcf1e138c033e28d7b434c0cef53b2b343c08a3da6a404b001bcf34b8fef3850ed8b352173e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      92471b0244f351dd450b83a4777f6505

      SHA1

      b613d1616e4553419cec248907f309beb203f1e3

      SHA256

      3ad23fb2e6737bd16875c001afab816379968e528de8384e4f8a6316dc0ed516

      SHA512

      29de25d9c2fcd3b32a8b5e17514d4b8c8881761cba9e73ffbb86216c25c58f93d1877b8064279df5fc8023c71df2e697fbe4f4b50a673ac3695e98a03ae62312

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      07d590e131eeb8db1b33ca596baab616

      SHA1

      8323c18949766133b07e9314b36681cbbc5ff837

      SHA256

      2ebc1c2ef9134df1f2982f5e1c09fd7b092b950276cb12cc63f08586adc12bfd

      SHA512

      afd98c5e0c4bd7cef572c878870e3dc92e57a32c241eafb6665f744f4434a14dcc92b459cef05864ec6d6d3ad5f36388119be1302f680c047082851be02212c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      599240d56c4c54dcbd8620cda7bed8f7

      SHA1

      8083719e9193cb837c3e96f0ce76dd68ebbe750e

      SHA256

      0b3be91e02b8f169e647bb2363a28201cc0a247a90329ab1feef3050049ad77c

      SHA512

      beb4b41eb7c0ccfd6210e6d76609f07c4fc97d1805467324fb5c8b7940c9adbb0d5e1506ede6e0e23da164f21ef8bb1cf7dc67fdb032b3301befa5385eb5e256

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2f8c6f6f3a1fafe8cffa0515423b6976

      SHA1

      a6b00d32128a3224041bb1d278e86fcd62d8b861

      SHA256

      7d95a40c7f0b39af009ed6afe9b67ae3b714d5bd1e2d5b5399d42a655d63a9ea

      SHA512

      ac401c020754d7592c438f8529177931afc2325d650e9948ec8e857d1821db03fc19a8c8e78c828ce96bfb7440a2107bf34d17a59ac76cd4b2db18cb5c3a0241

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0ecc696103bd8ceb65048e8b6da5c643

      SHA1

      9520cb5798070bda18251d4c3383c2416be47a78

      SHA256

      a8dd0541b375bbb58275f771c3e81eff60dba2fef1c492f60c071b72499c00b0

      SHA512

      e4fae6bbf51d0b55f1ee46b7a042df5d1672fe8390dcd41879f357c07d476010fd0ee46655e2887811563d9ee91280da7de2de5648c8078b52ae685c3262e6ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      4abf032cd560bca0ce59392d4938edc0

      SHA1

      254695bccf9b5c24ea6d23b8d116097e97287347

      SHA256

      7e770521875a88609bc090d340db5a02db3951779d9c5b53eb1b2359f00f572a

      SHA512

      2dde6be07c16849ae4a4c131dc741d128cb272bf4723ce5b8f3430e7bf492503943e9d4d1663fc48587e8b5aea9cfae6159dda507c2a90a61a043f0aaec16088

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      d7c3c5506b50788afea6d656e33ee363

      SHA1

      40798331dedbf90c71f95ad61355a9596f293669

      SHA256

      edcf020ec40c509f637d0e262945f9e56c67e96bd26f42e8dfe56fbc869d9340

      SHA512

      6b29bc23af6b17fd5e1588d92a70fe79579fc1e90385be35917030887b7257e35adf1c25956ac4a8cb07151e324b68cf4df91dc5fe1d3302e9270da938fa864b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\Cab5A34.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar5BA3.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PKUJMDHN.txt

      Filesize

      608B

      MD5

      f468e8149f610acee7302d43bf3e828c

      SHA1

      062f751ecfe7ab3af01fd530a7d8583039eb292e

      SHA256

      b519ed176a3aacd66ccd95e160c19054e718dd0540c3969a30201679082d2c27

      SHA512

      394e4a2fb5783df9ce1b3792474e418ea446a7945bd55967c5ac4fc07ca2dca5826ebec540dc10fd9aae18a86cbcc11df719fb0ed6770d58e178d65d75f12557

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe

      Filesize

      641KB

      MD5

      d42db66314c69f0edb2a3e9c5050e206

      SHA1

      9d86c1636ff9a7b2f3733a194208799aa78c9b3a

      SHA256

      7be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375

      SHA512

      68a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe

      Filesize

      641KB

      MD5

      d42db66314c69f0edb2a3e9c5050e206

      SHA1

      9d86c1636ff9a7b2f3733a194208799aa78c9b3a

      SHA256

      7be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375

      SHA512

      68a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524

    • C:\Users\Admin\Downloads\TDS.zip.1m133ng.partial

      Filesize

      435KB

      MD5

      45c833c41261ceadf9f32788b0d455c0

      SHA1

      5bf53005f1773741f18910eb17a90019e0563235

      SHA256

      3deaa710705edb01e4403fca3f413d4f9978a4fba3101f4670cc17dbfbe1f90d

      SHA512

      56dedda26e9293d33b962e2ed84cef9fa4ec2d918946b4618ce68ecdacb3cf6bf9894e4429d8231e6249f00b7ad8a82dd0de351a38e2201e97f2b4f9b3f5069a

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe

      Filesize

      641KB

      MD5

      d42db66314c69f0edb2a3e9c5050e206

      SHA1

      9d86c1636ff9a7b2f3733a194208799aa78c9b3a

      SHA256

      7be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375

      SHA512

      68a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpzuzofk.exe

      Filesize

      641KB

      MD5

      d42db66314c69f0edb2a3e9c5050e206

      SHA1

      9d86c1636ff9a7b2f3733a194208799aa78c9b3a

      SHA256

      7be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375

      SHA512

      68a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524

    • memory/800-597-0x0000000000800000-0x0000000000802000-memory.dmp

      Filesize

      8KB

    • memory/1168-599-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1168-600-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1168-598-0x0000000000090000-0x0000000000092000-memory.dmp

      Filesize

      8KB