Analysis
-
max time kernel
1s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe
Resource
win10v2004-20240412-en
General
-
Target
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe
-
Size
4.2MB
-
MD5
366d84826a079b4734a8746276b8dd35
-
SHA1
e9baa1e8612c13ff936948df8e7077d191330453
-
SHA256
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
-
SHA512
60f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61
-
SSDEEP
98304:ZU4Iq03aI5N3yqqHwBEspKQ2DvCGo03KUue+TC:rIh7By/QBEsp+2hnfC
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral1/memory/1288-2-0x0000000005270000-0x0000000005B5B000-memory.dmp family_glupteba behavioral1/memory/1288-3-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/3112-63-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/1288-70-0x0000000005270000-0x0000000005B5B000-memory.dmp family_glupteba behavioral1/memory/1288-84-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/3112-220-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-258-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-269-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-273-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-277-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-281-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-285-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-289-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-293-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-297-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-301-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-305-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral1/memory/2436-309-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5092 netsh.exe -
resource yara_rule behavioral1/files/0x0008000000023471-263.dat upx behavioral1/memory/4876-267-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1544-271-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1544-279-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4764 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe 4772 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"1⤵PID:1288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"2⤵PID:3112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1380
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4000
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5092
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:5116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2148
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2436
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2576
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2972
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:736
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4876
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2768
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4764
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5db695b2f7f845b6fa0b7521edb78ab6f
SHA136172fe0f05209a8357a6afd6ef988bd3e86c159
SHA2568d4ac536e276eee9f5442aeb51356f1f984021bebefa1b9029c47cf9d422e118
SHA51214b9db5f58e685561c77cd558fdab9c00429aaf9425e4f83cbe84d57dc37f1a7fa2fa13a81f18dc484f0fdfcdb2d8b2a8a462a547870a7f831a2f0b9c55a5491
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53487e91564c9d3116f38d4a22e57ecad
SHA1695e98305075cbbec72070e0f73453c86b902b95
SHA25692fceb535738e19759dcaafc512fc305c58f848c2437cfc6e59b33fc636dbd40
SHA5126ae55403b285bc4e7f5f1ad3c933fdc44664c33e0b1848a003f33822538e6bdb6a8a392fb092f3e0e2ed519d37c45b77b4ca6ca71c2882598fdd360fccb4ee66
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cbc3a32675827d3e1c14c9fb4217c245
SHA17af2031a271cdc07b94bff05f28fa8491404938f
SHA256c5bb639d36f2a2f07b2c8b9a55933593df3d6693917239cf18f19bfcc226e691
SHA5127c86bbd04cdaa7f72bd4ca2fef5805cf2582263a67fad53336d55593eb7e094052dc7c716ad85ae99e350439ea56a2b6018b63697aec4dadc027b42c43175869
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD567a4ab7117bdee070078d6694e72ed19
SHA1413c65a1ea00747fadd0d0da36fb23d462b24ff6
SHA256a45cdb3bc770cc1e1fe8e0c2ee55c13a2959f11cbcfb6a81ddd9e44374408e31
SHA512c3cdb0a16466e30d3aea6af56d5749f99f7cf6e291543eacc9181a05a302b50f22c0002309c93b372a7f7877b438d9356b7709180bc631527187a783129d84ab
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD591845a67e9d2b0ad0fe8371b6afd3968
SHA11481b7979c069dd8481577eec51006db08b8729c
SHA2568a39011be11a9b46b7cce4615c4d1a2d24bf73b77c712d02524ce45d198d8d47
SHA5125eb7646ff63fcb3ec522b288800ef78516f7eb63e4203340049ee484a0fb1728dc3bb8effff4182d28471853da52b7c8ab5303d2f1eec67cd86d26c0d34da1f3
-
Filesize
4.2MB
MD5366d84826a079b4734a8746276b8dd35
SHA1e9baa1e8612c13ff936948df8e7077d191330453
SHA256910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
SHA51260f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec