Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 05:12
Behavioral task
behavioral1
Sample
262393553d01d6f0834416d382cf6480N.exe
Resource
win7-20240708-en
General
-
Target
262393553d01d6f0834416d382cf6480N.exe
-
Size
689KB
-
MD5
262393553d01d6f0834416d382cf6480
-
SHA1
c6d04c2a5eb7694db7c75e703ee65dfb89fbae5d
-
SHA256
f04ddd1ef19ab0ed436a554d95368055d9c6fae6f156710570a7423bad9e9929
-
SHA512
92bd413af398d0e08ceba2e73eb2fdc0a65aa01351bf1e04fe690981c05d7a7692a096b474f45aa0fb455cf93bc8bc4ea0103e930350a538f134edcc1c56a69d
-
SSDEEP
12288:Ed+J+IF3iIj6I4ClL7y446A9jmP/uhu/yMS08CkntxYRfL:1+HIefw7ofmP/UDMS08Ckn36
Malware Config
Extracted
kutaki
http://newlinkwotolove.club/love/three.php
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kgnvezfk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kgnvezfk.exe 262393553d01d6f0834416d382cf6480N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kgnvezfk.exe 262393553d01d6f0834416d382cf6480N.exe -
Executes dropped EXE 1 IoCs
Processes:
kgnvezfk.exepid process 1980 kgnvezfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
262393553d01d6f0834416d382cf6480N.exekgnvezfk.execmd.exemspaint.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262393553d01d6f0834416d382cf6480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgnvezfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 5000 mspaint.exe 5000 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.exekgnvezfk.exemspaint.exepid process 5052 262393553d01d6f0834416d382cf6480N.exe 5052 262393553d01d6f0834416d382cf6480N.exe 5052 262393553d01d6f0834416d382cf6480N.exe 1980 kgnvezfk.exe 1980 kgnvezfk.exe 1980 kgnvezfk.exe 5000 mspaint.exe 5000 mspaint.exe 5000 mspaint.exe 5000 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
262393553d01d6f0834416d382cf6480N.execmd.exedescription pid process target process PID 5052 wrote to memory of 8 5052 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 5052 wrote to memory of 8 5052 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 5052 wrote to memory of 8 5052 262393553d01d6f0834416d382cf6480N.exe cmd.exe PID 5052 wrote to memory of 1980 5052 262393553d01d6f0834416d382cf6480N.exe kgnvezfk.exe PID 5052 wrote to memory of 1980 5052 262393553d01d6f0834416d382cf6480N.exe kgnvezfk.exe PID 5052 wrote to memory of 1980 5052 262393553d01d6f0834416d382cf6480N.exe kgnvezfk.exe PID 8 wrote to memory of 5000 8 cmd.exe mspaint.exe PID 8 wrote to memory of 5000 8 cmd.exe mspaint.exe PID 8 wrote to memory of 5000 8 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\262393553d01d6f0834416d382cf6480N.exe"C:\Users\Admin\AppData\Local\Temp\262393553d01d6f0834416d382cf6480N.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kgnvezfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kgnvezfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD5262393553d01d6f0834416d382cf6480
SHA1c6d04c2a5eb7694db7c75e703ee65dfb89fbae5d
SHA256f04ddd1ef19ab0ed436a554d95368055d9c6fae6f156710570a7423bad9e9929
SHA51292bd413af398d0e08ceba2e73eb2fdc0a65aa01351bf1e04fe690981c05d7a7692a096b474f45aa0fb455cf93bc8bc4ea0103e930350a538f134edcc1c56a69d