Analysis
-
max time kernel
0s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe
Resource
win7-20231215-en
General
-
Target
501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe
-
Size
4.1MB
-
MD5
2e9500d61872b5d0ecab1fcd1816a7f2
-
SHA1
476843d9fdcf68be91a1c2ae3fac40d938c521bf
-
SHA256
501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544
-
SHA512
189f3b84bbbe90339ddcd917b5d3003d397578a73632beb3bbee36b868c4baea7e2cc95119843b524254a066948aef843736eb3eb46c1e211318f7c9a52eb4e4
-
SSDEEP
98304:jnDxDynn2HvxGAPnSV1Ywzt/74819SmvpEDTxeMn0j4Y+m32:nNq2kAv1wR14mv4A4hmm
Malware Config
Signatures
-
Glupteba payload 2 IoCs
resource yara_rule behavioral1/memory/2520-2-0x0000000002A60000-0x000000000334B000-memory.dmp family_glupteba behavioral1/memory/2520-4-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2628 netsh.exe -
Modifies boot configuration data using bcdedit 1 IoCs
pid Process 1608 bcdedit.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1684 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe 2732 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe"C:\Users\Admin\AppData\Local\Temp\501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe"1⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe"C:\Users\Admin\AppData\Local\Temp\501588291bc3c786ac2ed9f7aa499868598d53383d07a9be5be76c386ca51544.exe"2⤵PID:2488
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1016
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3052
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵PID:1980
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2100
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:1608
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2732
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:2328
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240102155536.log C:\Windows\Logs\CBS\CbsPersist_20240102155536.cab1⤵PID:2900
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2628
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2596
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:1684
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:1676