Analysis
-
max time kernel
85s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:31
Behavioral task
behavioral1
Sample
Payment_Receipt.exe
Resource
win7-20230621-en
General
-
Target
Payment_Receipt.exe
-
Size
812KB
-
MD5
fad8c7f1f023b519a8bc97f44c845f1b
-
SHA1
e305349bd0dda9732aaab10499153d6e80ce11bc
-
SHA256
c056c58e3d32716447e27dbe38e784b685203dededddf1253ba4051d0a7a174a
-
SHA512
ff1a302e99ad89f01c805517085fd76291ee594edc0e9e9c3980cd47dbf1c2429016b11df3b7621eb96da914809b2bb47e5291ec3cd2894f43ff116f9ce39fb3
-
SSDEEP
12288:jw/h2mDPAtjj4cv6aiUoIxbU546A9jmP/uhu/yMS08CkntxYRK:EPmjj4cZfmP/UDMS08Ckn3n
Malware Config
Extracted
kutaki
http://newloshree.xyz/work/son.php
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
Payment_Receipt.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe Payment_Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe Payment_Receipt.exe -
Executes dropped EXE 1 IoCs
Processes:
nddfiuch.exepid process 1732 nddfiuch.exe -
Loads dropped DLL 2 IoCs
Processes:
Payment_Receipt.exepid process 1324 Payment_Receipt.exe 1324 Payment_Receipt.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Payment_Receipt.exenddfiuch.exepid process 1324 Payment_Receipt.exe 1324 Payment_Receipt.exe 1324 Payment_Receipt.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe 1732 nddfiuch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Payment_Receipt.exedescription pid process target process PID 1324 wrote to memory of 1664 1324 Payment_Receipt.exe cmd.exe PID 1324 wrote to memory of 1664 1324 Payment_Receipt.exe cmd.exe PID 1324 wrote to memory of 1664 1324 Payment_Receipt.exe cmd.exe PID 1324 wrote to memory of 1664 1324 Payment_Receipt.exe cmd.exe PID 1324 wrote to memory of 1732 1324 Payment_Receipt.exe nddfiuch.exe PID 1324 wrote to memory of 1732 1324 Payment_Receipt.exe nddfiuch.exe PID 1324 wrote to memory of 1732 1324 Payment_Receipt.exe nddfiuch.exe PID 1324 wrote to memory of 1732 1324 Payment_Receipt.exe nddfiuch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment_Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Receipt.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1664
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nddfiuch.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD5fad8c7f1f023b519a8bc97f44c845f1b
SHA1e305349bd0dda9732aaab10499153d6e80ce11bc
SHA256c056c58e3d32716447e27dbe38e784b685203dededddf1253ba4051d0a7a174a
SHA512ff1a302e99ad89f01c805517085fd76291ee594edc0e9e9c3980cd47dbf1c2429016b11df3b7621eb96da914809b2bb47e5291ec3cd2894f43ff116f9ce39fb3
-
Filesize
812KB
MD5fad8c7f1f023b519a8bc97f44c845f1b
SHA1e305349bd0dda9732aaab10499153d6e80ce11bc
SHA256c056c58e3d32716447e27dbe38e784b685203dededddf1253ba4051d0a7a174a
SHA512ff1a302e99ad89f01c805517085fd76291ee594edc0e9e9c3980cd47dbf1c2429016b11df3b7621eb96da914809b2bb47e5291ec3cd2894f43ff116f9ce39fb3
-
Filesize
812KB
MD5fad8c7f1f023b519a8bc97f44c845f1b
SHA1e305349bd0dda9732aaab10499153d6e80ce11bc
SHA256c056c58e3d32716447e27dbe38e784b685203dededddf1253ba4051d0a7a174a
SHA512ff1a302e99ad89f01c805517085fd76291ee594edc0e9e9c3980cd47dbf1c2429016b11df3b7621eb96da914809b2bb47e5291ec3cd2894f43ff116f9ce39fb3
-
Filesize
812KB
MD5fad8c7f1f023b519a8bc97f44c845f1b
SHA1e305349bd0dda9732aaab10499153d6e80ce11bc
SHA256c056c58e3d32716447e27dbe38e784b685203dededddf1253ba4051d0a7a174a
SHA512ff1a302e99ad89f01c805517085fd76291ee594edc0e9e9c3980cd47dbf1c2429016b11df3b7621eb96da914809b2bb47e5291ec3cd2894f43ff116f9ce39fb3