Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
45cf09e26acea6e9d65bfef33939f4cc.exe
Resource
win7-20231215-en
General
-
Target
45cf09e26acea6e9d65bfef33939f4cc.exe
-
Size
4.4MB
-
MD5
45cf09e26acea6e9d65bfef33939f4cc
-
SHA1
0f8fde24d0f0cabbcfcd97eb1b7ae84f4cbd4331
-
SHA256
b25b92d25b55c23f75775f1f50e83d5efc2881e8bdb02c0d2a3c3b4b21ccb9eb
-
SHA512
8913e691f5e6f449cad2d0836635b148b0fc98411218b7f2f4920b40cb8ad9ae8b385a88806a045aaeca477076180ab3087519e0d1ab4345bac82a9739a9af35
-
SSDEEP
98304:YoIRGeaWtfnBWWGqJlOOpLFWikkLMXwxFr8oiWtWKo4pX0x:mvnhGqJlOOjWRkLMAxFDF9
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral2/memory/860-2-0x0000000005280000-0x0000000005BA6000-memory.dmp family_glupteba behavioral2/memory/860-3-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral2/memory/860-5-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral2/memory/860-6-0x0000000005280000-0x0000000005BA6000-memory.dmp family_glupteba behavioral2/memory/456-8-0x0000000005190000-0x0000000005AB6000-memory.dmp family_glupteba behavioral2/memory/456-9-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral2/memory/456-14-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral2/memory/456-18-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4464 netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4176 860 WerFault.exe 15 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1456 schtasks.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 88 Go-http-client/1.1 HTTP User-Agent header 89 Go-http-client/1.1 HTTP User-Agent header 90 Go-http-client/1.1 HTTP User-Agent header 56 Go-http-client/1.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"1⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"2⤵PID:456
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2032
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵PID:1336
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 8322⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 860 -ip 8601⤵PID:976
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:4464