Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:52
Behavioral task
behavioral1
Sample
TDS Payment Challan.exe
Resource
win7-20240705-en
General
-
Target
TDS Payment Challan.exe
-
Size
671KB
-
MD5
62aea7e47f647f9d6d2cdacb15e4b163
-
SHA1
884550e92ac4ad9c24f3473d889b9247775f5ee5
-
SHA256
73a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
-
SHA512
59cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283
-
SSDEEP
12288:uig7QBOXvCY9PU5KXpGPqlSpwhm4s5bsGSCs5:CEy6gU5KXrlSpnHuGE5
Malware Config
Signatures
-
Kutaki Executable 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-4.dat family_kutaki -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe TDS Payment Challan.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 lunlerio.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum lunlerio.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 lunlerio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TDS Payment Challan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lunlerio.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main lunlerio.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe 1820 TDS Payment Challan.exe 2296 lunlerio.exe 2296 lunlerio.exe 2296 lunlerio.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe 30 PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe 30 PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe 30 PID 1820 wrote to memory of 1724 1820 TDS Payment Challan.exe 30 PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe 33 PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe 33 PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe 33 PID 1820 wrote to memory of 2296 1820 TDS Payment Challan.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"C:\Users\Admin\AppData\Local\Temp\TDS Payment Challan.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lunlerio.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD562aea7e47f647f9d6d2cdacb15e4b163
SHA1884550e92ac4ad9c24f3473d889b9247775f5ee5
SHA25673a3c2d670bc63cd77c0ccbfd6fc92972531897317c630f26f02ad58dbbf0af3
SHA51259cdbc399225f2bf6fb3f56cfaa4c3705a0a5f23ae7d59ccf14467c19adc6ef5694fa91afae80ebeedd44ac3974923b6d8c616d87cc55a0d2fd8e2310108c283