Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe
Resource
win10v2004-20240412-en
General
-
Target
6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe
-
Size
4.2MB
-
MD5
0c2accc2e57305304c3d82450e1a0efc
-
SHA1
d64d348c3c97a1ca3d7b5392c3167a41f0534f61
-
SHA256
6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f
-
SHA512
0405137a33c9c1903171249da07a7e0877882e0679840f46d4cf586ae883e1a0e6fdfc171186a6fa6ab40049ae0e464ff5071930087490f2617aae679e0a3f04
-
SSDEEP
98304:2QInvlJBJIUJQszVJveaj34waKWau7RuKZVdiWsTMW:69QGJLORuK1UMW
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/1020-2-0x0000000005090000-0x000000000597B000-memory.dmp family_glupteba behavioral1/memory/1020-3-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1020-54-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1020-56-0x0000000005090000-0x000000000597B000-memory.dmp family_glupteba behavioral1/memory/2528-58-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2528-137-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2528-156-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-262-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-271-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-273-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-275-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-277-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-279-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-281-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-283-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-285-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/1652-287-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4984 netsh.exe -
resource yara_rule behavioral1/files/0x000400000001e752-266.dat upx behavioral1/memory/4996-269-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2780-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2780-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3532 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4928 1020 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe 3360 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe"C:\Users\Admin\AppData\Local\Temp\6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe"1⤵PID:1020
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe"C:\Users\Admin\AppData\Local\Temp\6e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f.exe"2⤵PID:2528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:632
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4460
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4984
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4936
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1652
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1700
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4416
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3360
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4996
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4496
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3532
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 7882⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1020 -ip 10201⤵PID:4848
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f109afb5daf93d7370b6aa7c3c1cf427
SHA18dbd38eed82cd902370e212d530408b99c8f0d2e
SHA256788b8f8778f51cf5bd8d8cf5819ef6a02d53429e9f2d95d372b6412bc2e8432f
SHA51245cd6dab0135068b5cac386f8f4b2b4e6b0992ddc634d4a7374ae3919b7041330cecd688d354ede31ac24ed3544e1838a8c59d9846402e6245cf2c5e255d010d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e390839441bee8f0f3984d3549b5378f
SHA1a5c393352ef8b8508ae73280d61b32f02a67a3b9
SHA256c980d32080bec2757fd2347ccff2b674066d722ea3e1145f994c93366d16137a
SHA51295e1b0127f28dab78be75f86893a17d3531934a52dd6d00774672dd4303468f1df48bedba24d55e2338b16d9abf240511ae18baabd87044720d5cf3ea88b77b7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5327c0b7f6401b20262e96fcad882f42f
SHA1ae5c44cdbf2a72960611606ec798367bf58d459b
SHA256bb998651dd50b15e5f4834ab0fbc3143fbd53377db8ea9cfd1eed0e31a0aa8b1
SHA512c0b53ef1b0762d01898d5c9804246dfe4e0eb5a00e2fa0863adee513f270a2e777fa88454cef21aafd2ca66fe8b67392add951a3e76e37a0da71747148fa169f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5deed9dcd7ca36a42dc69129ee32e683f
SHA1e6d8216ba26bea0deff246381ccc3633c7861f96
SHA25659767eb3cedec8a5b469313a28e004c5b018b202799cba3f7ac448fb334a3269
SHA5128329298acd859c4ecc714c90ae029112d23a8c54ca31435a1f2363452ccbefa85e22b312d6340efc02c47f225b5aa7dfd27748a98e8e807f6de23c343025f1c3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5661fc4c4f39072e792b919701ff93f84
SHA1492fbab8f4fecb28c420c1d2373f53a4a812a832
SHA2567fd182ff60c05c039512e8307c139bdf67ba798374814fe530834e66cdccb742
SHA512743b31fe7b004accfba605eda022cc596e52ffffd020ab5e1413f99d87e4c25a556c57581de8f4636097ca7e60c76113afab91e8dda2ff6feae4a237c20f8bad
-
Filesize
4.2MB
MD50c2accc2e57305304c3d82450e1a0efc
SHA1d64d348c3c97a1ca3d7b5392c3167a41f0534f61
SHA2566e4aaf030253303b37fc9adfa2c461f30f5a5aef5087eb6d50cf1075f40f7d7f
SHA5120405137a33c9c1903171249da07a7e0877882e0679840f46d4cf586ae883e1a0e6fdfc171186a6fa6ab40049ae0e464ff5071930087490f2617aae679e0a3f04
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec