Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 02:48
Static task
static1
Behavioral task
behavioral1
Sample
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe
-
Size
3.8MB
-
MD5
6b25f01b08dada97878d7a7409b4c100
-
SHA1
cc411194050b944d1a88223adaa76b99878c183c
-
SHA256
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d
-
SHA512
b27dc0e29fb4f979647220072bdf3e05f51a022aa119a5fe24d6fbcdc357dc865f42eaae72791220b1bd71e5e94d72b0bbfb6fe7074e2a13a67e9f27bfe42427
Malware Config
Signatures
-
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1928-131-0x0000000002D00000-0x00000000033F5000-memory.dmp family_glupteba behavioral2/memory/116-133-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/116-135-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/116-136-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 1048 created 116 1048 svchost.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exedescription pid process target process PID 1928 set thread context of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exepid process 116 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 116 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exesvchost.exedescription pid process Token: SeDebugPrivilege 116 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe Token: SeImpersonatePrivilege 116 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe Token: SeTcbPrivilege 1048 svchost.exe Token: SeTcbPrivilege 1048 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exesvchost.exedescription pid process target process PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1928 wrote to memory of 116 1928 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1048 wrote to memory of 1892 1048 svchost.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1048 wrote to memory of 1892 1048 svchost.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe PID 1048 wrote to memory of 1892 1048 svchost.exe 97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"C:\Users\Admin\AppData\Local\Temp\97a9ca08fee98a34adfdb1e8e19559bff624bd7d094b2cd80c9629b7a426440d.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/116-132-0x0000000000000000-mapping.dmp
-
memory/116-133-0x0000000000400000-0x0000000000B0F000-memory.dmpFilesize
7.1MB
-
memory/116-135-0x0000000000400000-0x0000000000B0F000-memory.dmpFilesize
7.1MB
-
memory/116-136-0x0000000000400000-0x0000000000B0F000-memory.dmpFilesize
7.1MB
-
memory/1892-137-0x0000000000000000-mapping.dmp
-
memory/1928-130-0x0000000002950000-0x0000000002CF6000-memory.dmpFilesize
3.6MB
-
memory/1928-131-0x0000000002D00000-0x00000000033F5000-memory.dmpFilesize
7.0MB