Analysis
-
max time kernel
1s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe
Resource
win10v2004-20240412-en
General
-
Target
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe
-
Size
4.2MB
-
MD5
366d84826a079b4734a8746276b8dd35
-
SHA1
e9baa1e8612c13ff936948df8e7077d191330453
-
SHA256
910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
-
SHA512
60f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61
-
SSDEEP
98304:ZU4Iq03aI5N3yqqHwBEspKQ2DvCGo03KUue+TC:rIh7By/QBEsp+2hnfC
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/560-2-0x00000000052B0000-0x0000000005B9B000-memory.dmp family_glupteba behavioral2/memory/560-3-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/4524-63-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/560-66-0x00000000052B0000-0x0000000005B9B000-memory.dmp family_glupteba behavioral2/memory/560-79-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/4524-203-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-243-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-254-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-258-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-262-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-266-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-270-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-274-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-278-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-282-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-286-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-290-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2012-294-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4244 netsh.exe -
resource yara_rule behavioral2/files/0x000200000002a9b4-247.dat upx behavioral2/memory/1356-251-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1404-256-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1404-264-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1404-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1168 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1812 schtasks.exe 1160 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"1⤵PID:560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"2⤵PID:4524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1320
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4752
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4244
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3004
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3588
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2124
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4752
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1356
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2776
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1168
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59995ccd20c142147e71252f772108ab8
SHA169f4020afd6c49f59aa07c2553706d3d1ce51c9c
SHA25637a7125f61c0e8cd12d4ef5a54c06ffa35a8ccfd4f1f43e5383baeded3cc8f6d
SHA5121adf907e86aec9612a853917dd186b588800525011d5d7a095bedb6bf8c18994f2513494ee382f4762a72dc8b2626d432830e6b853102f990958d8dbe48fdca6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a78538660f469dd256f2a58afe81026f
SHA171b60cdde4616cb25c98c7de5fa1a6e8be92354f
SHA2560088e31c7711d369904adc9ff3599bbae3e8b1133a31a26784210f7af77367c4
SHA51256e1eef884cffb3d77fd2307c35cef9a6fe0c350160ac9adabf3d17b8d3eb010fc1007e2fcc63187dce103164fcc077875807d9e84f50f63609a84d85787a36a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59dee2cf23c3e10eb7e441c2aa6949ef5
SHA154b858616230b8e8d409b3acc46203addf05d6f1
SHA256c1eb9e2b9ede0fda10b6a4cfd33b023b930c7b01472c5d1900b67ee3ffb7bac0
SHA51288ddc682b699e2aa7872fd6e183434478b4ce3280c3051e3a09c2ca9c28e1d469b877a286a744224c4697e1d56d45e58813a768d46911af3c28f7ca590c65366
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57af2daad658170d0ae895a702e102c52
SHA1dcb3da69b7ff174767ef4e7bc79eae6e01f559c7
SHA256669bdfaf55de22854da8b46c2cd43ec4528061c4450d451bf6837420496a4741
SHA512fe47c187cb11b3a0ecca47e0535e62a505be5d7a1102f5fb6b3843707264eb640b485f783ffe3f7db3564a7382f1b19641a555c0dae7e5dacbd0ecc8a838e2b0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57c47102a9b34f4aed10483b25a87714a
SHA1adc3dd668789ebf22d45b8926f2b6968f74e7eb6
SHA256b791e4d24d4032971c64e1f082ffd94f424c8454c0b0f0630e8090d00359d1eb
SHA5120690de1cef6c53a8fd1da2c51ae64ef618a8a917a8f62696f363a19d9922f2ca0986d589c89616989a101b711f8254dc4b0026f82860d6bddf5ce2f41b61344d
-
Filesize
4.2MB
MD5366d84826a079b4734a8746276b8dd35
SHA1e9baa1e8612c13ff936948df8e7077d191330453
SHA256910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
SHA51260f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec