Analysis
-
max time kernel
200s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 04:14
General
-
Target
Tax Payment Challan.exe
-
Size
597KB
-
MD5
dd1d64884898d506bf90c29890f1b4bc
-
SHA1
e1ea541eb0a3ab8670e77d124da4ceb4b8febc9b
-
SHA256
d2aab40a9073aa3f2970017b652e4d42e34ad11c5505994ba8945013aedac69e
-
SHA512
bf5fa648c0fe45b346a50bbb5b8fd0ff7af5aa17df3a3a37df03f6d76ebcd35b6906851e1138bd111c1010815c4f31aaaa5f00fa44f73d648e32e6592c500f99
-
SSDEEP
12288:TK1aFT8EUJHvXH/Xgx46A9jmP/uhu/yMS08CkntxYReaL:TBYLJvXH/wqfmP/UDMS08Ckn3o
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lteijufk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
Tax Payment Challan.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lteijufk.exe Tax Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lteijufk.exe Tax Payment Challan.exe -
Executes dropped EXE 1 IoCs
Processes:
lteijufk.exepid process 1676 lteijufk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 4724 mspaint.exe 4724 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
Tax Payment Challan.exelteijufk.exemspaint.exepid process 4168 Tax Payment Challan.exe 4168 Tax Payment Challan.exe 4168 Tax Payment Challan.exe 1676 lteijufk.exe 1676 lteijufk.exe 1676 lteijufk.exe 4724 mspaint.exe 4724 mspaint.exe 4724 mspaint.exe 4724 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Tax Payment Challan.execmd.exedescription pid process target process PID 4168 wrote to memory of 4052 4168 Tax Payment Challan.exe cmd.exe PID 4168 wrote to memory of 4052 4168 Tax Payment Challan.exe cmd.exe PID 4168 wrote to memory of 4052 4168 Tax Payment Challan.exe cmd.exe PID 4168 wrote to memory of 1676 4168 Tax Payment Challan.exe lteijufk.exe PID 4168 wrote to memory of 1676 4168 Tax Payment Challan.exe lteijufk.exe PID 4168 wrote to memory of 1676 4168 Tax Payment Challan.exe lteijufk.exe PID 4052 wrote to memory of 4724 4052 cmd.exe mspaint.exe PID 4052 wrote to memory of 4724 4052 cmd.exe mspaint.exe PID 4052 wrote to memory of 4724 4052 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\Tax Payment Challan.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lteijufk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lteijufk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3780
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597KB
MD5dd1d64884898d506bf90c29890f1b4bc
SHA1e1ea541eb0a3ab8670e77d124da4ceb4b8febc9b
SHA256d2aab40a9073aa3f2970017b652e4d42e34ad11c5505994ba8945013aedac69e
SHA512bf5fa648c0fe45b346a50bbb5b8fd0ff7af5aa17df3a3a37df03f6d76ebcd35b6906851e1138bd111c1010815c4f31aaaa5f00fa44f73d648e32e6592c500f99