Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 13:06
Behavioral task
behavioral1
Sample
NEAS.237060068077322d5f33bb309259a5c0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.237060068077322d5f33bb309259a5c0.exe
-
Size
693KB
-
MD5
237060068077322d5f33bb309259a5c0
-
SHA1
6e480d71feab775e20b16f4aa80fd4bab8d2b65f
-
SHA256
5945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
-
SHA512
c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
SSDEEP
12288:2zU8Mu2wf+dBzOxgm46A9jmP/uhu/yMS08CkntxYRZL:2w8t2wf+dBTfmP/UDMS08Ckn3M
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe family_kutaki C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe family_kutaki \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe NEAS.237060068077322d5f33bb309259a5c0.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe NEAS.237060068077322d5f33bb309259a5c0.exe -
Executes dropped EXE 1 IoCs
Processes:
vtoargfk.exepid process 2600 vtoargfk.exe -
Loads dropped DLL 2 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exepid process 2028 NEAS.237060068077322d5f33bb309259a5c0.exe 2028 NEAS.237060068077322d5f33bb309259a5c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2656 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exevtoargfk.exepid process 2028 NEAS.237060068077322d5f33bb309259a5c0.exe 2028 NEAS.237060068077322d5f33bb309259a5c0.exe 2028 NEAS.237060068077322d5f33bb309259a5c0.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe 2600 vtoargfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exedescription pid process target process PID 2028 wrote to memory of 2380 2028 NEAS.237060068077322d5f33bb309259a5c0.exe cmd.exe PID 2028 wrote to memory of 2380 2028 NEAS.237060068077322d5f33bb309259a5c0.exe cmd.exe PID 2028 wrote to memory of 2380 2028 NEAS.237060068077322d5f33bb309259a5c0.exe cmd.exe PID 2028 wrote to memory of 2380 2028 NEAS.237060068077322d5f33bb309259a5c0.exe cmd.exe PID 2028 wrote to memory of 2600 2028 NEAS.237060068077322d5f33bb309259a5c0.exe vtoargfk.exe PID 2028 wrote to memory of 2600 2028 NEAS.237060068077322d5f33bb309259a5c0.exe vtoargfk.exe PID 2028 wrote to memory of 2600 2028 NEAS.237060068077322d5f33bb309259a5c0.exe vtoargfk.exe PID 2028 wrote to memory of 2600 2028 NEAS.237060068077322d5f33bb309259a5c0.exe vtoargfk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.237060068077322d5f33bb309259a5c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.237060068077322d5f33bb309259a5c0.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵PID:2380
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vtoargfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed