Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 06:21
Behavioral task
behavioral1
Sample
Tax Payment Confirmation.exe
Resource
win7-20231023-en
General
-
Target
Tax Payment Confirmation.exe
-
Size
501KB
-
MD5
229542167bc737c7ceec0394cb8eae67
-
SHA1
b1fdf16782bee715faf2fe7f1581272793708e08
-
SHA256
09caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
-
SHA512
7d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
SSDEEP
12288:gYcs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqTD:gYcs+XKy/AZeJ9AP8LP810o4HfyNQlQS
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
Tax Payment Confirmation.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe Tax Payment Confirmation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe Tax Payment Confirmation.exe -
Executes dropped EXE 1 IoCs
Processes:
dbxvibfk.exepid process 4652 dbxvibfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 3000 mspaint.exe 3000 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
Tax Payment Confirmation.exedbxvibfk.exemspaint.exepid process 2796 Tax Payment Confirmation.exe 2796 Tax Payment Confirmation.exe 2796 Tax Payment Confirmation.exe 4652 dbxvibfk.exe 4652 dbxvibfk.exe 4652 dbxvibfk.exe 3000 mspaint.exe 3000 mspaint.exe 3000 mspaint.exe 3000 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Tax Payment Confirmation.execmd.exedescription pid process target process PID 2796 wrote to memory of 1740 2796 Tax Payment Confirmation.exe cmd.exe PID 2796 wrote to memory of 1740 2796 Tax Payment Confirmation.exe cmd.exe PID 2796 wrote to memory of 1740 2796 Tax Payment Confirmation.exe cmd.exe PID 2796 wrote to memory of 4652 2796 Tax Payment Confirmation.exe dbxvibfk.exe PID 2796 wrote to memory of 4652 2796 Tax Payment Confirmation.exe dbxvibfk.exe PID 2796 wrote to memory of 4652 2796 Tax Payment Confirmation.exe dbxvibfk.exe PID 1740 wrote to memory of 3000 1740 cmd.exe mspaint.exe PID 1740 wrote to memory of 3000 1740 cmd.exe mspaint.exe PID 1740 wrote to memory of 3000 1740 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Confirmation.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbxvibfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d
-
Filesize
501KB
MD5229542167bc737c7ceec0394cb8eae67
SHA1b1fdf16782bee715faf2fe7f1581272793708e08
SHA25609caf68ad8cb1a459675913732e7191285d03e7b83e244b5ddce69e0b97c1fc5
SHA5127d8995c724c598de8a05e7f5ea2e50f1583dcfc5611143ac4290bc8a77eeeecf3e3fd55acc687b92bc4745f7e194487f0c21504a695b95dcb9eaebb048da5d5d