Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 05:12
Behavioral task
behavioral1
Sample
262393553d01d6f0834416d382cf6480N.exe
Resource
win7-20240708-en
General
-
Target
262393553d01d6f0834416d382cf6480N.exe
-
Size
689KB
-
MD5
262393553d01d6f0834416d382cf6480
-
SHA1
c6d04c2a5eb7694db7c75e703ee65dfb89fbae5d
-
SHA256
f04ddd1ef19ab0ed436a554d95368055d9c6fae6f156710570a7423bad9e9929
-
SHA512
92bd413af398d0e08ceba2e73eb2fdc0a65aa01351bf1e04fe690981c05d7a7692a096b474f45aa0fb455cf93bc8bc4ea0103e930350a538f134edcc1c56a69d
-
SSDEEP
12288:Ed+J+IF3iIj6I4ClL7y446A9jmP/uhu/yMS08CkntxYRfL:1+HIefw7ofmP/UDMS08Ckn36
Malware Config
Extracted
kutaki
http://newlinkwotolove.club/love/three.php
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isoismfk.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isoismfk.exe 262393553d01d6f0834416d382cf6480N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isoismfk.exe 262393553d01d6f0834416d382cf6480N.exe -
Executes dropped EXE 1 IoCs
Processes:
isoismfk.exepid process 1668 isoismfk.exe -
Loads dropped DLL 2 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exepid process 1732 262393553d01d6f0834416d382cf6480N.exe 1732 262393553d01d6f0834416d382cf6480N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
262393553d01d6f0834416d382cf6480N.execmd.exeisoismfk.exeDllHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262393553d01d6f0834416d382cf6480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isoismfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2824 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exeisoismfk.exepid process 1732 262393553d01d6f0834416d382cf6480N.exe 1732 262393553d01d6f0834416d382cf6480N.exe 1732 262393553d01d6f0834416d382cf6480N.exe 1668 isoismfk.exe 1668 isoismfk.exe 1668 isoismfk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exedescription pid process target process PID 1732 wrote to memory of 1720 1732 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 1732 wrote to memory of 1720 1732 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 1732 wrote to memory of 1720 1732 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 1732 wrote to memory of 1720 1732 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 1732 wrote to memory of 1668 1732 262393553d01d6f0834416d382cf6480N.exe isoismfk.exe PID 1732 wrote to memory of 1668 1732 262393553d01d6f0834416d382cf6480N.exe isoismfk.exe PID 1732 wrote to memory of 1668 1732 262393553d01d6f0834416d382cf6480N.exe isoismfk.exe PID 1732 wrote to memory of 1668 1732 262393553d01d6f0834416d382cf6480N.exe isoismfk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\262393553d01d6f0834416d382cf6480N.exe"C:\Users\Admin\AppData\Local\Temp\262393553d01d6f0834416d382cf6480N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isoismfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isoismfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD5262393553d01d6f0834416d382cf6480
SHA1c6d04c2a5eb7694db7c75e703ee65dfb89fbae5d
SHA256f04ddd1ef19ab0ed436a554d95368055d9c6fae6f156710570a7423bad9e9929
SHA51292bd413af398d0e08ceba2e73eb2fdc0a65aa01351bf1e04fe690981c05d7a7692a096b474f45aa0fb455cf93bc8bc4ea0103e930350a538f134edcc1c56a69d