Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 12:19
Behavioral task
behavioral1
Sample
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe
Resource
win7-20240704-en
General
-
Target
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe
-
Size
561KB
-
MD5
ae3ecc20ed5eb6d09ac71eed21cadc7b
-
SHA1
8a5c57538ab356dcf99a320fc3724e618411a7b7
-
SHA256
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca
-
SHA512
a91b222f4890cc53f159390bc5ff725d525a6fb64e9a58842b35ecd0b17a2b989593cea9d16b83473c9fccb3af072296ef0a99499843ca372257ab8fc9e110f1
-
SSDEEP
12288:dUJ+IF3iIj6bn46A9jmP/uhu/yMS08CkntxYRCL:m+HIe8fmP/UDMS08Ckn3x
Malware Config
Extracted
kutaki
http://newlinkwotolove.club/love/three.php
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulsrepfk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulsrepfk.exe 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulsrepfk.exe 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe -
Executes dropped EXE 1 IoCs
Processes:
ulsrepfk.exepid process 984 ulsrepfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exeulsrepfk.execmd.exemspaint.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ulsrepfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 1776 mspaint.exe 1776 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exeulsrepfk.exemspaint.exepid process 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe 984 ulsrepfk.exe 984 ulsrepfk.exe 984 ulsrepfk.exe 1776 mspaint.exe 1776 mspaint.exe 1776 mspaint.exe 1776 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.execmd.exedescription pid process target process PID 4904 wrote to memory of 3480 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe cmd.exe PID 4904 wrote to memory of 3480 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe cmd.exe PID 4904 wrote to memory of 3480 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe cmd.exe PID 4904 wrote to memory of 984 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe ulsrepfk.exe PID 4904 wrote to memory of 984 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe ulsrepfk.exe PID 4904 wrote to memory of 984 4904 2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe ulsrepfk.exe PID 3480 wrote to memory of 1776 3480 cmd.exe mspaint.exe PID 3480 wrote to memory of 1776 3480 cmd.exe mspaint.exe PID 3480 wrote to memory of 1776 3480 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe"C:\Users\Admin\AppData\Local\Temp\2c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulsrepfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ulsrepfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
561KB
MD5ae3ecc20ed5eb6d09ac71eed21cadc7b
SHA18a5c57538ab356dcf99a320fc3724e618411a7b7
SHA2562c87a4f8cd94516457dcb4f4563a558120b9b3f9f4aaef5d12eb383ef6b7d4ca
SHA512a91b222f4890cc53f159390bc5ff725d525a6fb64e9a58842b35ecd0b17a2b989593cea9d16b83473c9fccb3af072296ef0a99499843ca372257ab8fc9e110f1