Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 09:16
Behavioral task
behavioral1
Sample
Payment Channel.exe
Resource
win7-20231020-en
General
-
Target
Payment Channel.exe
-
Size
501KB
-
MD5
646849ab728ff631b3c70480638e6a2a
-
SHA1
8f9f70ef43add2a45e0a2430b2d9680616faef8b
-
SHA256
b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
-
SHA512
32f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
SSDEEP
12288:7Ycs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqT1:7Ycs+XKy/AZeJ9AP8LP810o4HfyNQlQM
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
Payment Channel.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe Payment Channel.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe Payment Channel.exe -
Executes dropped EXE 1 IoCs
Processes:
boktxkfk.exepid process 2300 boktxkfk.exe -
Loads dropped DLL 2 IoCs
Processes:
Payment Channel.exepid process 3064 Payment Channel.exe 3064 Payment Channel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2748 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Payment Channel.exeboktxkfk.exepid process 3064 Payment Channel.exe 3064 Payment Channel.exe 3064 Payment Channel.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe 2300 boktxkfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Payment Channel.exedescription pid process target process PID 3064 wrote to memory of 2464 3064 Payment Channel.exe cmd.exe PID 3064 wrote to memory of 2464 3064 Payment Channel.exe cmd.exe PID 3064 wrote to memory of 2464 3064 Payment Channel.exe cmd.exe PID 3064 wrote to memory of 2464 3064 Payment Channel.exe cmd.exe PID 3064 wrote to memory of 2300 3064 Payment Channel.exe boktxkfk.exe PID 3064 wrote to memory of 2300 3064 Payment Channel.exe boktxkfk.exe PID 3064 wrote to memory of 2300 3064 Payment Channel.exe boktxkfk.exe PID 3064 wrote to memory of 2300 3064 Payment Channel.exe boktxkfk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:2464
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boktxkfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3