Analysis
-
max time kernel
102s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-05-2022 00:35
Static task
static1
Behavioral task
behavioral1
Sample
8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe
Resource
win7-20220414-en
General
-
Target
8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe
-
Size
3.9MB
-
MD5
41489a9eb3c63f2902748eeefc682cf7
-
SHA1
15cc46a4b8002afe3ec0b4468b5cd8ce69fc2baa
-
SHA256
8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0
-
SHA512
2c1a271939e3a77b048d458f0399128c52383843ea0ba06cd7fae301e28f63023bf226032fc94640fcb98ced6c599be3dcfa676f129bafa24f9a2bd9af263c59
Malware Config
Signatures
-
Glupteba Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2284-131-0x0000000005B60000-0x000000000625C000-memory.dmp family_glupteba behavioral2/memory/2284-132-0x0000000000400000-0x0000000005158000-memory.dmp family_glupteba behavioral2/memory/3408-137-0x0000000000400000-0x0000000005158000-memory.dmp family_glupteba behavioral2/memory/3904-144-0x0000000006000000-0x00000000066FC000-memory.dmp family_glupteba behavioral2/memory/3904-145-0x0000000000400000-0x0000000005158000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3128 3408 WerFault.exe 8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe"C:\Users\Admin\AppData\Local\Temp\8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe"C:\Users\Admin\AppData\Local\Temp\8743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0.exe"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\83876a664c4b\83876a664c4b.exe" enable=yes"3⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 8283⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\83876a664c4b\83876a664c4b.exe" enable=yes1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3408 -ip 34081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\rss\csrss.exeFilesize
3.9MB
MD541489a9eb3c63f2902748eeefc682cf7
SHA115cc46a4b8002afe3ec0b4468b5cd8ce69fc2baa
SHA2568743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0
SHA5122c1a271939e3a77b048d458f0399128c52383843ea0ba06cd7fae301e28f63023bf226032fc94640fcb98ced6c599be3dcfa676f129bafa24f9a2bd9af263c59
-
C:\Windows\rss\csrss.exeFilesize
3.9MB
MD541489a9eb3c63f2902748eeefc682cf7
SHA115cc46a4b8002afe3ec0b4468b5cd8ce69fc2baa
SHA2568743c37485edab28e9e1880236f7ec2f336635aeee90598fcf49ac541682a3b0
SHA5122c1a271939e3a77b048d458f0399128c52383843ea0ba06cd7fae301e28f63023bf226032fc94640fcb98ced6c599be3dcfa676f129bafa24f9a2bd9af263c59
-
memory/1412-147-0x0000000000000000-mapping.dmp
-
memory/2284-131-0x0000000005B60000-0x000000000625C000-memory.dmpFilesize
7.0MB
-
memory/2284-132-0x0000000000400000-0x0000000005158000-memory.dmpFilesize
77.3MB
-
memory/2284-130-0x00000000057A7000-0x0000000005B50000-memory.dmpFilesize
3.7MB
-
memory/2740-134-0x0000000000000000-mapping.dmp
-
memory/3408-133-0x0000000000000000-mapping.dmp
-
memory/3408-136-0x00000000056E4000-0x0000000005A8D000-memory.dmpFilesize
3.7MB
-
memory/3408-137-0x0000000000400000-0x0000000005158000-memory.dmpFilesize
77.3MB
-
memory/3904-140-0x0000000000000000-mapping.dmp
-
memory/3904-143-0x0000000005C00000-0x0000000005FA9000-memory.dmpFilesize
3.7MB
-
memory/3904-144-0x0000000006000000-0x00000000066FC000-memory.dmpFilesize
7.0MB
-
memory/3904-145-0x0000000000400000-0x0000000005158000-memory.dmpFilesize
77.3MB
-
memory/4488-138-0x0000000000000000-mapping.dmp
-
memory/4552-135-0x0000000000000000-mapping.dmp
-
memory/4676-139-0x0000000000000000-mapping.dmp