Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 06:29
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10-20240214-en
General
-
Target
file.exe
-
Size
597KB
-
MD5
ec665f89e74d25d37731652989ad3c2e
-
SHA1
82818a05e393db30f6c72c13cf8086b1dd6f67c7
-
SHA256
620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78
-
SHA512
c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8
-
SSDEEP
12288:qK1aFT8EUJHvXH/Xgv46A9jmP/uhu/yMS08CkntxYRWaL:qBYLJvXH/wgfmP/UDMS08Ckn3E
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 1 IoCs
resource yara_rule behavioral3/files/0x0007000000023149-5.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bznvdffk.exe file.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bznvdffk.exe file.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 bznvdffk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3676 mspaint.exe 3676 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4732 file.exe 4732 file.exe 4732 file.exe 1560 bznvdffk.exe 1560 bznvdffk.exe 1560 bznvdffk.exe 3676 mspaint.exe 3676 mspaint.exe 3676 mspaint.exe 3676 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1360 4732 file.exe 83 PID 4732 wrote to memory of 1360 4732 file.exe 83 PID 4732 wrote to memory of 1360 4732 file.exe 83 PID 4732 wrote to memory of 1560 4732 file.exe 85 PID 4732 wrote to memory of 1560 4732 file.exe 85 PID 4732 wrote to memory of 1560 4732 file.exe 85 PID 1360 wrote to memory of 3676 1360 cmd.exe 86 PID 1360 wrote to memory of 3676 1360 cmd.exe 86 PID 1360 wrote to memory of 3676 1360 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bznvdffk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bznvdffk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597KB
MD5ec665f89e74d25d37731652989ad3c2e
SHA182818a05e393db30f6c72c13cf8086b1dd6f67c7
SHA256620fafa603b8414c4bb1616f52c37335f2903df7af4da487926a6c6965ee2f78
SHA512c774ded25b26229a97e42575b6b13415807c43b76b7eb36081a507ca407090885821e336d4f23ae61cdd627f3daad2a433c6d55eeab7039623c5c152a8a099f8