Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
5c4a2bfc412603a57e770cb9129598c1.exe
Resource
win7-20231215-en
General
-
Target
5c4a2bfc412603a57e770cb9129598c1.exe
-
Size
4.4MB
-
MD5
5c4a2bfc412603a57e770cb9129598c1
-
SHA1
1c2a416245ffcc5e61ef47f72c0216075ca5ce95
-
SHA256
b7ba0c0a6d055683da95cbec459739f13f6d0499f25b35ebeec2c625dc770b3e
-
SHA512
cce3a36565e36c7a88dcb4e782937619ee94bdc457be311e62bdd9b975583b64816e7fa95db117bbf028f5f0b95dbb43f972cfcc4283a53047cbf112beb9b091
-
SSDEEP
98304:YRRqu5E4LwYYX93bjAoXn5J2bdQPHw4lPmhQeHpNgpGPEoqE:YPq4MX93b8wn5YbdQvw4lPmhQeJNAGPh
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/1620-2-0x0000000005190000-0x0000000005AB6000-memory.dmp family_glupteba behavioral2/memory/1620-3-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/1620-5-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/1620-6-0x0000000005190000-0x0000000005AB6000-memory.dmp family_glupteba behavioral2/memory/740-8-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/740-16-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-20-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-21-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-27-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-29-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-30-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-31-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-32-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-33-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-34-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-35-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-36-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-37-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-38-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba behavioral2/memory/3344-39-0x0000000000400000-0x000000000309C000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4888 netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4120 1620 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4384 schtasks.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 29 Go-http-client/1.1 HTTP User-Agent header 40 Go-http-client/1.1 HTTP User-Agent header 41 Go-http-client/1.1 HTTP User-Agent header 42 Go-http-client/1.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4a2bfc412603a57e770cb9129598c1.exe"C:\Users\Admin\AppData\Local\Temp\5c4a2bfc412603a57e770cb9129598c1.exe"1⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\5c4a2bfc412603a57e770cb9129598c1.exe"C:\Users\Admin\AppData\Local\Temp\5c4a2bfc412603a57e770cb9129598c1.exe"2⤵PID:740
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2696
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4888
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /93-933⤵PID:3344
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 6522⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1620 -ip 16201⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.0MB
MD54b2bdabacd56f7ace658742c17a7227d
SHA13e37549e2124e5fed356486b253f3ab8647edec0
SHA256eb138bba6beccb8e4b047cfc09ba617048f7af16ea832dab69c680dbc00b4627
SHA51244501e59e49b587a7a93418c16ad34be0f0088e78678eee6f4e7f5e72c198e3654521473f93096706ce4234af522c7d6eab78148d9497752e6a5b8a9b6ae9404
-
Filesize
881KB
MD59020d48ff0929fd4c3a79e8ac54d8cbf
SHA1b8e642f5f704e17cff1a3dd0e187ce0e9bcc75fb
SHA2564416aea2dcfb3584dd84a0e1caa794c86494f575b1e0e30151843bb49c2c164e
SHA512d8a57b2c0ef321b3f9699410fbf3cd104481ac3a964d470664247c276ec41e1f0d93a60af5531caa6085a297128cdbc26a35d44595b39a3953e1485147a6594a