Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:52
Behavioral task
behavioral1
Sample
TDS Payment Challan.exe
Resource
win7-20240705-en
General
-
Target
TDS Payment Challan.exe
-
Size
671KB
-
MD5
62aea7e47f647f9d6d2cdacb15e4b163
-
SHA1
884550e92ac4ad9c24f3473d889b9247775f5ee5
-
SHA256
73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
-
SHA512
59cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283
-
SSDEEP
12288:uig7QBOXvCY9PU5KXpGPqlSpwhm4s5bsGSCs5:CEy6gU5KXrlSpnHuGE5
Malware Config
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
TDS Payment Challan.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe -
Executes dropped EXE 1 IoCs
Processes:
lunlerio.exepid process 2296 lunlerio.exe -
Loads dropped DLL 2 IoCs
Processes:
TDS Payment Challan.exepid process 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
lunlerio.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum lunlerio.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 lunlerio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TDS Payment Challan.execmd.exelunlerio.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TDS Payment Challan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lunlerio.exe -
Processes:
lunlerio.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main lunlerio.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
TDS Payment Challan.exelunlerio.exepid process 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe 2296 lunlerio.exe 2296 lunlerio.exe 2296 lunlerio.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
TDS Payment Challan.exedescription pid process target process PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe cmd.exe PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe cmd.exe PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe cmd.exe PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe cmd.exe PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe lunlerio.exe PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe lunlerio.exe PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe lunlerio.exe PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe lunlerio.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD562aea7e47f647f9d6d2cdacb15e4b163
SHA1884550e92ac4ad9c24f3473d889b9247775f5ee5
SHA25673a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
SHA51259cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283