Analysis
-
max time kernel
1s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe
Resource
win10v2004-20240412-en
General
-
Target
991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe
-
Size
4.2MB
-
MD5
aaa02ee040bc3d36c56f6616c539a52f
-
SHA1
5337e399cb1d60509925a19f528f20b787fedfee
-
SHA256
991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
-
SHA512
757fdd24a055f9df7d96bd9cd0b66b6dace91b45ca583d6571a2990b049f4438c1c65ad354d852abd9e27b32c112b8c4938fe7e013356dc8a7cfd14af476e1a7
-
SSDEEP
98304:Lz8muvG4/7oo98xMphVIqHAQJ7eNfIWzS5gC960Xfu6ti9vBy29J:LzvuvT/7/zVIWAQdeNfIWzX0W6tA42X
Malware Config
Signatures
-
Glupteba payload 14 IoCs
resource yara_rule behavioral2/memory/2940-2-0x0000000005220000-0x0000000005B0B000-memory.dmp family_glupteba behavioral2/memory/2940-3-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/712-53-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/2940-86-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/712-133-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/712-141-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-246-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-248-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-251-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-254-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-257-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-260-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-264-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral2/memory/4792-267-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1084 netsh.exe -
resource yara_rule behavioral2/files/0x000200000002aa20-241.dat upx behavioral2/memory/2312-245-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4800-249-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4800-255-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3824 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2872 schtasks.exe 568 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"1⤵PID:2940
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"2⤵PID:712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2880
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:764
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3688
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:4792
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4728
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2872
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:568
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1556
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3824
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574472a693fd55eb84aff5ccdbc45741d
SHA1dffc9e769f81d3864b363cd5b71bb16734abe6b0
SHA25603a95cccdc4f934b14880d7237322163f6e22d8289aa0cac8e49fd91e2e97e3a
SHA51262c915c9d936612288df1930cec9d4ff43757939a747126cb88d814fefe036f869b180f17ea74f7580e554550663710b2772c034632383e24414daf9ecbc1711
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b8eb1e3a85f3927615e00c932c53cae4
SHA1ef5ea44f3f23b62ec19f026dfb021140a4c74502
SHA2565ba1357917665f9dfee6e34452917efac30d197359c42ba68064282a3ff2c16a
SHA51259fa7379c167f77d6a5ae401f92607d9dc196356d632bc780d3908cebb816d00bb24870fbef17af92614b198415895d26a3c4e9dde033c39865490cefefc204b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD552b56db84d5c6cf7b4c6610f6f6aed84
SHA14efbbab6b1208b054f571566b643867bc7bd6af2
SHA256a44279302556dcdc9e1bb29a3d53bfb3b3bbb59d5c7977dc5c627c3df64059b3
SHA512d1cba3bb00ed3ca8b40cc3c3ce9bfbd2575302fbecb66e1053342280d272536d34436dc8c1c9812b6f1d47bd66387eab4bf0369d7e5727b22269071f56a42a0e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a02012f555d3acecf0f767eb476e5b25
SHA144ba4079c54bd7acfc7effd2d5e5a7d40508e32f
SHA2563f2886379251a12715332a02f6f08a08d871d69a9c089bb18418a03159e423af
SHA512a99ba3e5ae9910ae6e180677e4e4045be8c7cc3aa401d2d1da00e58274c32cf6ad95f99f16d85cb5e66712db7fc060d3a2d9bcbec90ddfa7d77ba4cd03bce16a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD579140fdc434fd0e0ae83c2788dad4aea
SHA1e9a22e9b5268f3b0257e644e26eb344bfa2a7419
SHA2567564d7e2b8980bb200e31b4224862f963847e58995e4c309d1d9265a07f4b963
SHA5122d16e1cd93473d106bf36340b5d66b153864e9f1b190fd7dd6e5e06f41fc7a9a2b1874b9924d1b4a0ef73d42f56652a68c422eadb458eb35584b5aa3a2b50d1b
-
Filesize
4.2MB
MD5aaa02ee040bc3d36c56f6616c539a52f
SHA15337e399cb1d60509925a19f528f20b787fedfee
SHA256991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
SHA512757fdd24a055f9df7d96bd9cd0b66b6dace91b45ca583d6571a2990b049f4438c1c65ad354d852abd9e27b32c112b8c4938fe7e013356dc8a7cfd14af476e1a7
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec