Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe
Resource
win7-20230831-en
General
-
Target
b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe
-
Size
4.2MB
-
MD5
654f6e4d8591ade35d32cf2f91cdfdf2
-
SHA1
1626099f8c06fe6d170d154d9305367f66469bbe
-
SHA256
b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc
-
SHA512
ae2b31fb228e134a668dcbab0ae1be453cab55229efc3a0cfd271d2a0bff0bb461a8621cd304ef65444bab05cc517d6882eaea0a61d76cef6d6a81a7d903e4e6
-
SSDEEP
98304:GQsdI15XMGsIqG7jK1nlxDBWJo0zqoXlBjYH:9sdI/M9mGJvBuo02oXlB0
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral2/memory/4600-2-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/4600-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4600-4-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4600-30-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral2/memory/4600-33-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4600-58-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1640-62-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1640-92-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1640-111-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1640-140-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1640-157-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1184-191-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1184-256-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1184-269-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1184-270-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1184-272-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2972 netsh.exe -
resource yara_rule behavioral2/files/0x00070000000232a4-264.dat upx behavioral2/files/0x00070000000232a4-266.dat upx behavioral2/files/0x00070000000232a4-267.dat upx behavioral2/memory/4396-268-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1260-271-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1260-275-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x00060000000232a5-282.dat upx behavioral2/files/0x00060000000232a5-283.dat upx behavioral2/memory/1260-286-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2044-288-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral2/memory/2044-290-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4852 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3824 schtasks.exe 756 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe"C:\Users\Admin\AppData\Local\Temp\b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe"1⤵PID:4600
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe"C:\Users\Admin\AppData\Local\Temp\b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc.exe"2⤵PID:1640
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4432
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3936
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2972
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3496
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1184
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1196
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4108
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4240
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:756
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4396
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:5080
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵PID:2044
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:4572
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:1936
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5d993e138a001e666bcc684b56c3e74a6
SHA12a7f2c5c6b8ca33960cff58d6335c4426c02f319
SHA2561e08b4303d4a07279f8829999b3ecf43db5dd2a5444532a1b733b3a0202a6161
SHA512014bc62b24cfc99d6ad9b50ffaa31057cecdd6bd0a1d0fd3be82357788d0b086c644b77213dfb52d424163f5029c8a992f62403b73a2cbd16944f449bbc16590
-
Filesize
2.6MB
MD56d889e64a932496369f738b67d8862b1
SHA11d2d09677bd2e760e70a1a0093ba46713b4de387
SHA256ec8d9994a909dd8ae1057080a3ac794f3f3b2eb06c046189313f9b990e2cc4ff
SHA51291b11eb123499178aa716235b51a42da4abf5256cf36aded39cdbf6fb03976270a6bd2669c8067005822e3e20c2e74a613ef9ee9c7e3c1ef2de9dace6106b9bf
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD536a947584fd01fa2d81ac882d89501c6
SHA159fd0c8df9d5495864dd6b521fafdce0cb836c98
SHA2568354e00026f1fa59058824e998c9447900ee1a0b80e9483269c30027b1ec80fa
SHA512d3b42cf1fb6410a2643ea3fc71b809c905c080c38e2830ef6dec25990ba8d5fd3332ce850c45ad717336e0f0736ec3d04176175bc0a150cba6d9cb688f07768f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aeaadc7691a3e6cb9bfcb6b9ee2e7a0a
SHA19929a00e945ad04762a575e9eb390c724caed66a
SHA2563a21f7c3716130a0ff141c4aaec76cc9b4ddeb7ad52d9061ff1e43cbfca390a4
SHA512b7e2a86958ee493cdfbb464a7cc737a2117abd64291b8df361079be5c048edc01d386ffab05075e88e6571d61b0f90762e94dadd4a9740d30586771f1104bd93
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d2401958a23eb79e0adf701a6f98ab80
SHA19be086953b40f36f6f5b0ded74929b2ae495f899
SHA256ac26fdafbca859a59a70fd3d9b7ee507b00bd088e3e95389e0ec64ed90a0b1c0
SHA512d59063a760f25bffe6cae0bcc92d74da5d532d9e8fd260394e293da8f16dcfe65c851cb0e18618514cd9e93cce446e2756d69d7fc175f36d8379eed0fa0e3614
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f8d39bd59238d7ace3b48073384df53a
SHA1e79d43eede7ffa840314d9dd4321a90d7d0953bf
SHA2562ff0ec51563d1b702dbb9e562fbca324da1d1845f0191cc1cd1696d05391ea5a
SHA5121539e7b05387cc5e120dacb8d21913e4c199b448890d41a955af7126bfcf5045b23a8de5a0d4fcb139d699de1f354e3b0a72b0d8a19f86921b20a235ccbdc6d4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fc7364222c4b7278211bec6a8f077c0c
SHA1072abcf2ef039463252ec4730f94430bab704dfd
SHA256e2ad5cc03de4405c38a747b3909ca006f0832966c1dc43a646079d569b61bd00
SHA512684c87e3facb9c4c3d10e61bf0c2554079c71f770423f911a6752544fb6fc0de79e9edbac8fd4c2150856a936926b4995d7f24fb6845d607c01bd0521132a7b8
-
Filesize
4.2MB
MD5654f6e4d8591ade35d32cf2f91cdfdf2
SHA11626099f8c06fe6d170d154d9305367f66469bbe
SHA256b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc
SHA512ae2b31fb228e134a668dcbab0ae1be453cab55229efc3a0cfd271d2a0bff0bb461a8621cd304ef65444bab05cc517d6882eaea0a61d76cef6d6a81a7d903e4e6
-
Filesize
4.2MB
MD5654f6e4d8591ade35d32cf2f91cdfdf2
SHA11626099f8c06fe6d170d154d9305367f66469bbe
SHA256b2708878dad61b995b1e3bfbc751e9c34aeeb8a2375801b9c6ab141c4745ffdc
SHA512ae2b31fb228e134a668dcbab0ae1be453cab55229efc3a0cfd271d2a0bff0bb461a8621cd304ef65444bab05cc517d6882eaea0a61d76cef6d6a81a7d903e4e6
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec