Analysis
-
max time kernel
156s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2023 09:16
Behavioral task
behavioral1
Sample
Payment Channel.exe
Resource
win7-20231020-en
General
-
Target
Payment Channel.exe
-
Size
501KB
-
MD5
646849ab728ff631b3c70480638e6a2a
-
SHA1
8f9f70ef43add2a45e0a2430b2d9680616faef8b
-
SHA256
b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
-
SHA512
32f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
SSDEEP
12288:7Ycs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqT1:7Ycs+XKy/AZeJ9AP8LP810o4HfyNQlQM
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
Payment Channel.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe Payment Channel.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe Payment Channel.exe -
Executes dropped EXE 1 IoCs
Processes:
fpbbivfk.exepid process 4064 fpbbivfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 2384 mspaint.exe 2384 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
Payment Channel.exefpbbivfk.exemspaint.exepid process 5116 Payment Channel.exe 5116 Payment Channel.exe 5116 Payment Channel.exe 4064 fpbbivfk.exe 4064 fpbbivfk.exe 4064 fpbbivfk.exe 2384 mspaint.exe 2384 mspaint.exe 2384 mspaint.exe 2384 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Payment Channel.execmd.exedescription pid process target process PID 5116 wrote to memory of 364 5116 Payment Channel.exe cmd.exe PID 5116 wrote to memory of 364 5116 Payment Channel.exe cmd.exe PID 5116 wrote to memory of 364 5116 Payment Channel.exe cmd.exe PID 5116 wrote to memory of 4064 5116 Payment Channel.exe fpbbivfk.exe PID 5116 wrote to memory of 4064 5116 Payment Channel.exe fpbbivfk.exe PID 5116 wrote to memory of 4064 5116 Payment Channel.exe fpbbivfk.exe PID 364 wrote to memory of 2384 364 cmd.exe mspaint.exe PID 364 wrote to memory of 2384 364 cmd.exe mspaint.exe PID 364 wrote to memory of 2384 364 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fpbbivfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3