Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2023 14:40
Behavioral task
behavioral1
Sample
Payment Channel.exe
Resource
win7-20231023-en
General
-
Target
Payment Channel.exe
-
Size
501KB
-
MD5
646849ab728ff631b3c70480638e6a2a
-
SHA1
8f9f70ef43add2a45e0a2430b2d9680616faef8b
-
SHA256
b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
-
SHA512
32f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
SSDEEP
12288:7Ycs+XKy/AZe+e9AP8LP810o4HfyNQlQj0DunOq0Mte9oIopkyd+wMeMIC10pqT1:7Ycs+XKy/AZeJ9AP8LP810o4HfyNQlQM
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000022e3c-5.dat family_kutaki behavioral2/files/0x0007000000022e3c-6.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
Payment Channel.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rjrbgkfk.exe Payment Channel.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rjrbgkfk.exe Payment Channel.exe -
Executes dropped EXE 1 IoCs
Processes:
rjrbgkfk.exepid Process 3728 rjrbgkfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid Process 3972 mspaint.exe 3972 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
Payment Channel.exerjrbgkfk.exemspaint.exepid Process 1572 Payment Channel.exe 1572 Payment Channel.exe 1572 Payment Channel.exe 3728 rjrbgkfk.exe 3728 rjrbgkfk.exe 3728 rjrbgkfk.exe 3972 mspaint.exe 3972 mspaint.exe 3972 mspaint.exe 3972 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Payment Channel.execmd.exedescription pid Process procid_target PID 1572 wrote to memory of 4500 1572 Payment Channel.exe 90 PID 1572 wrote to memory of 4500 1572 Payment Channel.exe 90 PID 1572 wrote to memory of 4500 1572 Payment Channel.exe 90 PID 1572 wrote to memory of 3728 1572 Payment Channel.exe 92 PID 1572 wrote to memory of 3728 1572 Payment Channel.exe 92 PID 1572 wrote to memory of 3728 1572 Payment Channel.exe 92 PID 4500 wrote to memory of 3972 4500 cmd.exe 94 PID 4500 wrote to memory of 3972 4500 cmd.exe 94 PID 4500 wrote to memory of 3972 4500 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"C:\Users\Admin\AppData\Local\Temp\Payment Channel.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rjrbgkfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rjrbgkfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3728
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3
-
Filesize
501KB
MD5646849ab728ff631b3c70480638e6a2a
SHA18f9f70ef43add2a45e0a2430b2d9680616faef8b
SHA256b8e4bcb3699104e49979cc86b84ce278bd6b9b392d65d465ac1acd7808ed0db0
SHA51232f0a0949c33e0b34239581bbb86d3ee42acdaddc9856c78a55b88924dcade166663e2c8345040dbc2f383b74ebda88e952d9091643d8a7ea8e5d1fd82002de3