Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 06:21
Behavioral task
behavioral1
Sample
Tax Payment Confirmation.exe
Resource
win7-20231023-en
General
-
Target
Tax Payment Confirmation.exe
-
Size
501KB
-
MD5
229542167bc737c7ceec0394cb8eae67
-
SHA1
b1fdf16782bee715faf2fe7f1581272793708e08
-
SHA256
09caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
-
SHA512
7d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
SSDEEP
12288:gYcs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqTD:gYcs+XKy/AZeJ9AP8LP810o4HfyNQlQS
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000d000000012265-4.dat family_kutaki behavioral1/files/0x000d000000012265-6.dat family_kutaki behavioral1/files/0x000d000000012265-10.dat family_kutaki behavioral1/files/0x000d000000012265-8.dat family_kutaki -
Drops startup file 2 IoCs
Processes:
Tax Payment Confirmation.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntmgabfk.exe Tax Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntmgabfk.exe Tax Payment Confirmation.exe -
Executes dropped EXE 1 IoCs
Processes:
ntmgabfk.exepid Process 2772 ntmgabfk.exe -
Loads dropped DLL 2 IoCs
Processes:
Tax Payment Confirmation.exepid Process 2364 Tax Payment Confirmation.exe 2364 Tax Payment Confirmation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 3068 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Tax Payment Confirmation.exentmgabfk.exepid Process 2364 Tax Payment Confirmation.exe 2364 Tax Payment Confirmation.exe 2364 Tax Payment Confirmation.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe 2772 ntmgabfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Tax Payment Confirmation.exedescription pid Process procid_target PID 2364 wrote to memory of 2712 2364 Tax Payment Confirmation.exe 29 PID 2364 wrote to memory of 2712 2364 Tax Payment Confirmation.exe 29 PID 2364 wrote to memory of 2712 2364 Tax Payment Confirmation.exe 29 PID 2364 wrote to memory of 2712 2364 Tax Payment Confirmation.exe 29 PID 2364 wrote to memory of 2772 2364 Tax Payment Confirmation.exe 31 PID 2364 wrote to memory of 2772 2364 Tax Payment Confirmation.exe 31 PID 2364 wrote to memory of 2772 2364 Tax Payment Confirmation.exe 31 PID 2364 wrote to memory of 2772 2364 Tax Payment Confirmation.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Confirmation.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:2712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntmgabfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntmgabfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d