Analysis
-
max time kernel
26s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe
Resource
win7-20220718-en
General
-
Target
98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe
-
Size
5.0MB
-
MD5
ed1f0a0037c07611763cb8f21ea92798
-
SHA1
4e365dc665d1e138115a061cac86b362af035f8e
-
SHA256
98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836
-
SHA512
ae227bafb233fd5bd2ef0d304a20e01812454c110c38d7351178eb2d69a25769520c201b0c2e6170cd408995a698c2b8a1be7f8a3aaf1270540a9eae83f3ef8a
Malware Config
Signatures
-
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/1284-132-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/1284-134-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/1544-138-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/1544-146-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/3920-149-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/3920-150-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba behavioral2/memory/3920-151-0x0000000000400000-0x0000000001113000-memory.dmp family_glupteba -
suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup
suricata: ET MALWARE Glupteba CnC Domain in DNS Lookup
-
Modifies Windows Firewall 1 TTPs 2 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe"C:\Users\Admin\AppData\Local\Temp\98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe"C:\Users\Admin\AppData\Local\Temp\98390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836.exe"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\rss\csrss.exeFilesize
5.0MB
MD5ed1f0a0037c07611763cb8f21ea92798
SHA14e365dc665d1e138115a061cac86b362af035f8e
SHA25698390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836
SHA512ae227bafb233fd5bd2ef0d304a20e01812454c110c38d7351178eb2d69a25769520c201b0c2e6170cd408995a698c2b8a1be7f8a3aaf1270540a9eae83f3ef8a
-
C:\Windows\rss\csrss.exeFilesize
5.0MB
MD5ed1f0a0037c07611763cb8f21ea92798
SHA14e365dc665d1e138115a061cac86b362af035f8e
SHA25698390e5008cdcc1bf8d1dd153604af94ac789463c15244d1ac0fa29eeba83836
SHA512ae227bafb233fd5bd2ef0d304a20e01812454c110c38d7351178eb2d69a25769520c201b0c2e6170cd408995a698c2b8a1be7f8a3aaf1270540a9eae83f3ef8a
-
memory/872-140-0x0000000000000000-mapping.dmp
-
memory/1284-130-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1284-134-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1284-135-0x0000000003346000-0x00000000036DD000-memory.dmpFilesize
3.6MB
-
memory/1284-131-0x0000000003346000-0x00000000036DD000-memory.dmpFilesize
3.6MB
-
memory/1284-132-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1544-137-0x00000000033A9000-0x0000000003740000-memory.dmpFilesize
3.6MB
-
memory/1544-133-0x0000000000000000-mapping.dmp
-
memory/1544-138-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1544-146-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1544-136-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/1552-141-0x0000000000000000-mapping.dmp
-
memory/1816-142-0x0000000000000000-mapping.dmp
-
memory/2640-139-0x0000000000000000-mapping.dmp
-
memory/3920-143-0x0000000000000000-mapping.dmp
-
memory/3920-147-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/3920-148-0x0000000003900000-0x0000000003C97000-memory.dmpFilesize
3.6MB
-
memory/3920-149-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/3920-150-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB
-
memory/3920-151-0x0000000000400000-0x0000000001113000-memory.dmpFilesize
13.1MB