Analysis
-
max time kernel
0s -
max time network
278s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe
Resource
win7-20231129-en
5 signatures
300 seconds
General
-
Target
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe
-
Size
4.2MB
-
MD5
7d4d5598fa708bdb171c82a4b720a8ab
-
SHA1
54e8db02463f8c2e763f1f4a3aac9f6bdb019c90
-
SHA256
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f
-
SHA512
0f6a64dbcb85542af858f6178b9b9d63506c447a82310bda1c2d5db62fde2e0a56698a9fdd82113a829bd4d3689946a4c4ce8688a6851b205320450d20bb3530
-
SSDEEP
98304:eonnMgHusXXbQYbgv8h6wxlh0UQ1LNwBMA:LnnMgHZsYbtk5fA
Malware Config
Signatures
-
Glupteba payload 23 IoCs
resource yara_rule behavioral1/memory/2932-2-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2932-3-0x0000000002BE0000-0x00000000034CB000-memory.dmp family_glupteba behavioral1/memory/2932-4-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2868-8-0x0000000002AB0000-0x000000000339B000-memory.dmp family_glupteba behavioral1/memory/2868-9-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2868-18-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-22-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-63-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-104-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-105-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-106-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-107-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-108-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-109-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-110-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-111-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-112-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-113-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-114-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-115-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-116-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-117-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2508-119-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2768 netsh.exe -
Modifies boot configuration data using bcdedit 1 IoCs
pid Process 564 bcdedit.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe 724 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe"C:\Users\Admin\AppData\Local\Temp\5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe"1⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe"C:\Users\Admin\AppData\Local\Temp\5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe"2⤵PID:2868
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2640
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2508
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵PID:712
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:960
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:564
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:724
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231225050117.log C:\Windows\Logs\CBS\CbsPersist_20231225050117.cab1⤵PID:2748
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2768