Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 05:21
Behavioral task
behavioral1
Sample
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe
Resource
win7-20240903-en
General
-
Target
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe
-
Size
861KB
-
MD5
fb5773dfd3c5a2c6809243e3637ec030
-
SHA1
33df56380e6f4539a34485812899724151df7413
-
SHA256
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60
-
SHA512
15a906058fecb609cca55c177203bded0ceb40bb5d4f909f6cd960195e9e78307f515a8afac20b4aa58488d686d58fbfb86668f091a9491131fb1bb69061d750
-
SSDEEP
24576:nELV7EVFRALV7EVFRiLLV7EVFRVVDwdr2CxfmP/UDMS08Ckn3s:cV7EVFR4V7EVFRivV7EVFRfwdr2Cxfmt
Malware Config
Extracted
kutaki
http://newlinkwotolove.club/love/three.php
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gyneyafk.exe family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gyneyafk.exe 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gyneyafk.exe 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe -
Executes dropped EXE 1 IoCs
Processes:
gyneyafk.exepid process 3952 gyneyafk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
gyneyafk.execmd.exemspaint.exe7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyneyafk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 4364 mspaint.exe 4364 mspaint.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exegyneyafk.exemspaint.exepid process 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe 3952 gyneyafk.exe 3952 gyneyafk.exe 3952 gyneyafk.exe 4364 mspaint.exe 4364 mspaint.exe 4364 mspaint.exe 4364 mspaint.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.execmd.exedescription pid process target process PID 4936 wrote to memory of 4892 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe cmd.exe PID 4936 wrote to memory of 4892 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe cmd.exe PID 4936 wrote to memory of 4892 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe cmd.exe PID 4936 wrote to memory of 3952 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe gyneyafk.exe PID 4936 wrote to memory of 3952 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe gyneyafk.exe PID 4936 wrote to memory of 3952 4936 7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe gyneyafk.exe PID 4892 wrote to memory of 4364 4892 cmd.exe mspaint.exe PID 4892 wrote to memory of 4364 4892 cmd.exe mspaint.exe PID 4892 wrote to memory of 4364 4892 cmd.exe mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe"C:\Users\Admin\AppData\Local\Temp\7498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60N.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gyneyafk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gyneyafk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD5fb5773dfd3c5a2c6809243e3637ec030
SHA133df56380e6f4539a34485812899724151df7413
SHA2567498bfd956f6d8cced206e7b68adce735fa461eb081ffe048cfbeb38cdb69b60
SHA51215a906058fecb609cca55c177203bded0ceb40bb5d4f909f6cd960195e9e78307f515a8afac20b4aa58488d686d58fbfb86668f091a9491131fb1bb69061d750