Analysis
-
max time kernel
203s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe
Resource
win7-20230831-en
General
-
Target
f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe
-
Size
4.2MB
-
MD5
4ebfeebf833a84e36fe375262df8c1d9
-
SHA1
b3708977a104bbf7b9a09fb341f061551fe75116
-
SHA256
f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae
-
SHA512
b93405d274e06e6228186ed17e890b1604fd33e9b8c7130351d6262256a6e443d8438d5f33dccb5a12ac091698c5dc174a8699daeba1f8573592c19398e13081
-
SSDEEP
98304:iqHi1d0SyoX78y0lw6KgquB6K/8xk2dOgHHCcd83Go1dtg4:XHi1dHyM8y/uB6Asn18Pt
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/452-1-0x0000000002D60000-0x000000000364B000-memory.dmp family_glupteba behavioral2/memory/452-2-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/452-4-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/452-5-0x0000000002D60000-0x000000000364B000-memory.dmp family_glupteba behavioral2/memory/452-7-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/452-27-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/452-37-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3544 powershell.exe 3544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3544 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 3544 452 f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe 95 PID 452 wrote to memory of 3544 452 f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe 95 PID 452 wrote to memory of 3544 452 f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe"C:\Users\Admin\AppData\Local\Temp\f7b6af1c5ca4d6111b901eb452c6954d2cd0016366bf772797bf17dc81472aae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82