Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19-02-2024 06:29
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10-20240214-en
General
-
Target
file.exe
-
Size
597KB
-
MD5
ec665f89e74d25d37731652989ad3c2e
-
SHA1
82818a05e393db30f6c72c13cf8086b1dd6f67c7
-
SHA256
620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78
-
SHA512
c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8
-
SSDEEP
12288:qK1aFT8EUJHvXH/Xgv46A9jmP/uhu/yMS08CkntxYRWaL:qBYLJvXH/wgfmP/UDMS08Ckn3E
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000001abef-5.dat family_kutaki -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tyunjtfk.exe file.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tyunjtfk.exe file.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 tyunjtfk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3721099760-3917598953-789468489-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4024 mspaint.exe 4024 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1664 file.exe 1664 file.exe 1664 file.exe 4864 tyunjtfk.exe 4864 tyunjtfk.exe 4864 tyunjtfk.exe 4024 mspaint.exe 4024 mspaint.exe 4024 mspaint.exe 4024 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1664 wrote to memory of 5004 1664 file.exe 72 PID 1664 wrote to memory of 5004 1664 file.exe 72 PID 1664 wrote to memory of 5004 1664 file.exe 72 PID 1664 wrote to memory of 4864 1664 file.exe 74 PID 1664 wrote to memory of 4864 1664 file.exe 74 PID 1664 wrote to memory of 4864 1664 file.exe 74 PID 5004 wrote to memory of 4024 5004 cmd.exe 75 PID 5004 wrote to memory of 4024 5004 cmd.exe 75 PID 5004 wrote to memory of 4024 5004 cmd.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tyunjtfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tyunjtfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵PID:356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597KB
MD5ec665f89e74d25d37731652989ad3c2e
SHA182818a05e393db30f6c72c13cf8086b1dd6f67c7
SHA256620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78
SHA512c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8