Analysis
-
max time kernel
158s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2023 14:40
Behavioral task
behavioral1
Sample
Payment Channel.exe
Resource
win7-20231023-en
General
-
Target
Payment Channel.exe
-
Size
501KB
-
MD5
646849ab728ff631b3c70480638e6a2a
-
SHA1
8f9f70ef43add2a45e0a2430b2d9680616faef8b
-
SHA256
b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
-
SHA512
32f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
SSDEEP
12288:7Ycs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqT1:7Ycs+XKy/AZeJ9AP8LP810o4HfyNQlQM
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000300000000b1f2-10.dat family_kutaki behavioral1/files/0x000300000000b1f2-8.dat family_kutaki behavioral1/files/0x000300000000b1f2-6.dat family_kutaki behavioral1/files/0x000300000000b1f2-4.dat family_kutaki -
Drops startup file 2 IoCs
Processes:
Payment Channel.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jwxgowfk.exe Payment Channel.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jwxgowfk.exe Payment Channel.exe -
Executes dropped EXE 1 IoCs
Processes:
jwxgowfk.exepid Process 2512 jwxgowfk.exe -
Loads dropped DLL 2 IoCs
Processes:
Payment Channel.exepid Process 952 Payment Channel.exe 952 Payment Channel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2812 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Payment Channel.exejwxgowfk.exepid Process 952 Payment Channel.exe 952 Payment Channel.exe 952 Payment Channel.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe 2512 jwxgowfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Payment Channel.exedescription pid Process procid_target PID 952 wrote to memory of 2728 952 Payment Channel.exe 29 PID 952 wrote to memory of 2728 952 Payment Channel.exe 29 PID 952 wrote to memory of 2728 952 Payment Channel.exe 29 PID 952 wrote to memory of 2728 952 Payment Channel.exe 29 PID 952 wrote to memory of 2512 952 Payment Channel.exe 31 PID 952 wrote to memory of 2512 952 Payment Channel.exe 31 PID 952 wrote to memory of 2512 952 Payment Channel.exe 31 PID 952 wrote to memory of 2512 952 Payment Channel.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:2728
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jwxgowfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jwxgowfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3