Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 13:06
Behavioral task
behavioral1
Sample
NEAS.237060068077322d5f33bb309259a5c0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.237060068077322d5f33bb309259a5c0.exe
-
Size
693KB
-
MD5
237060068077322d5f33bb309259a5c0
-
SHA1
6e480d71feab775e20b16f4aa80fd4bab8d2b65f
-
SHA256
5945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
-
SHA512
c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
SSDEEP
12288:2zU8Mu2wf+dBzOxgm46A9jmP/uhu/yMS08CkntxYRZL:2w8t2wf+dBTfmP/UDMS08Ckn3M
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0006000000022e07-5.dat family_kutaki behavioral2/files/0x0006000000022e07-6.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ljrvoufk.exe NEAS.237060068077322d5f33bb309259a5c0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ljrvoufk.exe NEAS.237060068077322d5f33bb309259a5c0.exe -
Executes dropped EXE 1 IoCs
Processes:
ljrvoufk.exepid Process 1324 ljrvoufk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid Process 4684 mspaint.exe 4684 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.exeljrvoufk.exemspaint.exepid Process 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 1324 ljrvoufk.exe 1324 ljrvoufk.exe 1324 ljrvoufk.exe 4684 mspaint.exe 4684 mspaint.exe 4684 mspaint.exe 4684 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
NEAS.237060068077322d5f33bb309259a5c0.execmd.exedescription pid Process procid_target PID 3096 wrote to memory of 3840 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 90 PID 3096 wrote to memory of 3840 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 90 PID 3096 wrote to memory of 3840 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 90 PID 3096 wrote to memory of 1324 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 92 PID 3096 wrote to memory of 1324 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 92 PID 3096 wrote to memory of 1324 3096 NEAS.237060068077322d5f33bb309259a5c0.exe 92 PID 3840 wrote to memory of 4684 3840 cmd.exe 93 PID 3840 wrote to memory of 4684 3840 cmd.exe 93 PID 3840 wrote to memory of 4684 3840 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.237060068077322d5f33bb309259a5c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.237060068077322d5f33bb309259a5c0.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4684
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ljrvoufk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ljrvoufk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed
-
Filesize
693KB
MD5237060068077322d5f33bb309259a5c0
SHA16e480d71feab775e20b16f4aa80fd4bab8d2b65f
SHA2565945debf94de6bbe53652b019c7f8be2d8bcee36cd0059ca46a2002ccc70c0c2
SHA512c2660dc7e38bce83596bfb0d0058e98ae8300e08a3981e0d732d0539d49140487ca6f46ab07ffbaa37f8594b115757d25cb16156b214f408caaa2875b7bf58ed