Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe
Resource
win10v2004-20240412-en
General
-
Target
22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe
-
Size
4.2MB
-
MD5
67d886157a87e93a405de7cf500ce316
-
SHA1
8fd1b436a88875999bcffa4c9ab31de091a5e560
-
SHA256
22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
-
SHA512
6c48bc8ea4e694c23d0f396adeeb4f5ca5b84ef9b467747431a09dd1e0ff35eab39dda5adc94f4f1cd3cf115218d02ffb652b0daf540c88b1d714cfa1270c7a6
-
SSDEEP
98304:Lz8muvG4/7oo98xMphVIqHAQJ7eNfIWzS5gC960Xfu6ti9vBy29R:LzvuvT/7/zVIWAQdeNfIWzX0W6tA42n
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral1/memory/736-2-0x0000000005280000-0x0000000005B6B000-memory.dmp family_glupteba behavioral1/memory/736-3-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4328-56-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4328-69-0x00000000051A0000-0x0000000005A8B000-memory.dmp family_glupteba behavioral1/memory/736-118-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4328-218-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-266-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-270-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-274-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-278-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-282-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-285-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-290-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-294-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-298-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-302-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-306-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/3460-310-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2304 netsh.exe -
resource yara_rule behavioral1/files/0x0008000000023451-260.dat upx behavioral1/memory/556-263-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4688-268-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4688-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2512 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 808 schtasks.exe 4044 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"1⤵PID:736
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"2⤵PID:4328
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2160
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2164
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2304
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3776
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1944
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:808
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4600
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4044
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1464
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:2512
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57588d6273270c2cbfb92927c33e79d0b
SHA139b9dc8e282ae22936b069cb64b82c168261c31f
SHA256ebde69d7ceb6652be3c5f2ccc07e8f3d147d177c28c78f8aed6d6036febaeb6c
SHA512d3162b31c6460eb83c735accb78000aead5a877a6b1853153d7afbe262fb64d59f654c91e4244627eb08ff516e1d7e5233359f517dda124daf3551f4d8d6f143
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dfbe343509e98d6fe221a681270b7397
SHA141c383fc67fad5b8e1a2b828137c8e8b04329056
SHA2566b592f761bb80e568b0898c9cecb2d06097913aa78727cb5bcfcf755f024772c
SHA512dd09ce5944fd46186c44df76e32a066e3ff4bb411c6bd901dfb8f489b50bb0be0cd231b57cf7b9d6e7a4ed9a6b36e30194e83139b6b72b42394125a5bb7e9c5c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD582a610125f5c28ad29f2659835249255
SHA18402077193bb905213174c10ceeeafd4944cf1eb
SHA256133bf4c54bdb241c071a67e3e2914dafb7c740c9c037cbaeededab2375d523bd
SHA51235ddd5b8e228fd663306a20bf1a95b328a1fd80e4f294335a1bb8a46c6a26b155e212af0802587d25f9725e8f2956a7928211eb8ebb7662600bfd5d905c81fdb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5eb0deafe946d1425cbade6d866bc228f
SHA1a3a7f8b3f1e185155d8e5fd3111a4c692b08ae76
SHA2564d081f85717f206864e9bf5f8be19bfaf17c597de1f6e738dd92cf9ef671c65f
SHA51209f6b7ec7c59a8a96d0461a598545033f75e24d1b23aec1b087e793665f53502df13c639fbab6185f392c15d46917a8ffd0ad1b712d656a7c3329fd5c4981bee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cedf548d336c6800f83ec8da942187fd
SHA185c619fadcf662d67a7b94313946ebb9b155f1fa
SHA25643d136613003992dbb410dcd777b208a08bdd37386e453a77efdaec75b26370d
SHA512747943e7820c7631e351cc61cc54ef3545bdd32a3c72cce9df5b911838d7aad71b20cd375139b42f4b2ac07853b69809bfcedc6a5e53dba34b5e74db95426906
-
Filesize
4.2MB
MD567d886157a87e93a405de7cf500ce316
SHA18fd1b436a88875999bcffa4c9ab31de091a5e560
SHA25622835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
SHA5126c48bc8ea4e694c23d0f396adeeb4f5ca5b84ef9b467747431a09dd1e0ff35eab39dda5adc94f4f1cd3cf115218d02ffb652b0daf540c88b1d714cfa1270c7a6
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec