Analysis
-
max time kernel
1s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe
Resource
win10v2004-20240412-en
General
-
Target
dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe
-
Size
4.2MB
-
MD5
aa64cf54033640aa3d03c340ef057bdf
-
SHA1
928c0735ff21c34d256819c79f78f3fc77111136
-
SHA256
dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
-
SHA512
a0ffd772763c3ff06f50e279e1b824e44873978d0308349ba5d2702841e163a5e18fa6cfb675e36e0a6c4c24e0435bc4c4cb8be38cd4e28533d8a0847099481a
-
SSDEEP
98304:jz8muvG4/7oo98xMphVIqHAQJ7eNfIWzS5gC960Xfu6ti9vBy29q:jzvuvT/7/zVIWAQdeNfIWzX0W6tA42M
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/1840-2-0x0000000005260000-0x0000000005B4B000-memory.dmp family_glupteba behavioral1/memory/1840-3-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4196-56-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4196-70-0x0000000005130000-0x0000000005A1B000-memory.dmp family_glupteba behavioral1/memory/1840-102-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4196-134-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/4196-216-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-254-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-265-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-269-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-273-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-277-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-281-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-285-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-289-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-293-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-297-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-301-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba behavioral1/memory/2052-309-0x0000000000400000-0x000000000310E000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3936 netsh.exe -
resource yara_rule behavioral1/files/0x0008000000023404-261.dat upx behavioral1/memory/4936-263-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1228-267-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1228-275-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1228-287-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4192 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2408 schtasks.exe 1684 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"1⤵PID:1840
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"2⤵PID:4196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3260
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3756
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2576
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:716
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2408
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3724
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4936
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3704
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4192
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD524b22517b96c49b0083861717dfcdd07
SHA109d2b2b3785dbe68bd03be11fc617547fdd6ac43
SHA25602fc2e3e6d0fe4d920028ad9bbde703d80b2d30f3a5fc5e67034d536086c6ded
SHA512608627f5a3f6978fd4f8a130cec7b42e51eaf335df0b295156b3b587e46e0900e63cfa0373155ecbe35bfc1acada654ed149b7fdb4234bddd5ffbff504ffca6d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ee61f3b643bf54e8c6a5901781e245b1
SHA1b20193427b61b349ae60edb35d0bc0a8ab278ce9
SHA256b02307808b259377667e45984ac4f507995d679919aad115cb7d696c2f40d507
SHA5129af7a45a5cd08a12eacf68c693ceda2cf81f265e9e9a6bcde562756a8947b47d013b0134b83928946a7df8448d81ba0cd7d6ced631afbc5d31c12faf75f0f1c3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b17d89d3409ce63edf7e60f82893ac13
SHA16b288f4269bd2310616e800a9b3c446bdc3b667f
SHA256bac6b0cd83d574d12029b0e0eae80341eece72518886d2d216798c36caeeb002
SHA512b42cabc7c31dfa9c99dbd3e0d42b536c9ba8abb2abf688ea89eca63e9843f5280a196bb5f0df9d1971e8fad1a280c21aef1aa32fabbfdaf4da67c4ee2c2c5ad4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54ef13e886b6ba0d34c3a1e02c3d0bd50
SHA1e381c54a833c9222bc7d03e82a915f8b696754fa
SHA2568791553a5cf4f0abfadbb83a6466314192bd160339b97bf824f3d7024a5ddac1
SHA5124821b5e671223b0924366e4e361ccd747e53c5b1fcc02995e8948dfdc9168a2fd170e2b8e0986c0cc8c13a693834c18fc559c96d26a8838395f0919f2cce1b62
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58e58443c2677e6f212884c25d5587f6f
SHA13fbfc42066a315f6e4acc156af916c4bda87955d
SHA2568d49d1b1a578aad8be8c52dd5aa0832215c4e0080c05fdccdae28c9d7e6e95dd
SHA512afd7ff00d0e4d36e6e6ce2495f1834be254a2c214ac8f79a8a94303c3c87148fd66a56568b231b28bd883a9ecda029877859c2a016158d71e86d779c2c2a35cf
-
Filesize
4.2MB
MD5aa64cf54033640aa3d03c340ef057bdf
SHA1928c0735ff21c34d256819c79f78f3fc77111136
SHA256dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
SHA512a0ffd772763c3ff06f50e279e1b824e44873978d0308349ba5d2702841e163a5e18fa6cfb675e36e0a6c4c24e0435bc4c4cb8be38cd4e28533d8a0847099481a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec