Analysis
-
max time kernel
1s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe
Resource
win10v2004-20240226-en
General
-
Target
399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe
-
Size
4.1MB
-
MD5
7f97943a4052d43ceec059028b7bd791
-
SHA1
a995e417536f67d9ae380e844682a6c685a595ac
-
SHA256
399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625
-
SHA512
1c23a7afa170eaf4dd1d21c5985a66b92e3eb3eb17e9079e1b2b8cbcd4b340d20196dfa36ae9f5cef28afe5a1b0b8509e19ea87114b43fc3d1f6edf2275b9253
-
SSDEEP
98304:NFddrpuoRE7tl1yJ8vae/QmLpm2XHwIZYQzHZc5g5rp30lCUzjm:3LdBQ1yJ8Sedm2XHUQNc5Xga6
Malware Config
Signatures
-
Glupteba payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/3812-2-0x0000000006810000-0x00000000070FB000-memory.dmp family_glupteba behavioral2/memory/3812-50-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3752-53-0x0000000006580000-0x0000000006E6B000-memory.dmp family_glupteba behavioral2/memory/3812-54-0x0000000006810000-0x00000000070FB000-memory.dmp family_glupteba behavioral2/memory/3752-145-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-238-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-247-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-249-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-251-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-253-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-255-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-257-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-259-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-261-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-263-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-265-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/4704-267-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3856 netsh.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/8-246-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/252-248-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/252-252-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1852 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5064 3752 WerFault.exe 399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4916 schtasks.exe 3652 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe"C:\Users\Admin\AppData\Local\Temp\399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe"1⤵PID:3812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe"C:\Users\Admin\AppData\Local\Temp\399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625.exe"2⤵PID:3752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3292
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1092
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1864
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4240
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:4704
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4740
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4916 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2316
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1756
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:768
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3652 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:8
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3080
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 9483⤵
- Program crash
PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3752 -ip 37521⤵PID:1604
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b09b324560f2cf34c979850495671014
SHA1e8f834d45ad44d4ab69c5c64222279f083e9527d
SHA25627d4bc70e4ec9f3f022a935f20782030e6b51d3f729ff89ad5ade74ca2043edb
SHA512aa042d4d1cbd4ba7ff258c7558cb351dbbc682f7dbbd2e2a90821c50bb01ef8f46a8f20ab9474899d0bfe77c2c539a24852606739be5a1fd1fb1fe20bd467f2e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b6e7ecce488b8e895a00bd7abddec462
SHA1eaeedb0fed0116796ff338ed73501f4204aea546
SHA256b4eb19bf43dd284272fb11a5cb96029c67c2c354ec9debad7283b845e1363532
SHA512b5ba76328fa39f81dd8d52bde32a1bb8d9aefef6ef64d5e541204641f27048dcc6af86bd9d6b863009c8b9c3e42361470c9abb6aec435318687f91432552a657
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56fbb88a6891798b929b300991f3dc9a1
SHA1fb727f981eb56ea8819cfa5e2082702171de1feb
SHA25615c9067a568e25837d7bfb236caf4182fd1265118881e42515d289200dbcc883
SHA512d8e553ee8befc535a926b67aff5c04bf4780750b99a3d368562cd05a50251a888622b093d475fa0840c3d22db1a2d2c9e3ed244c34a691fd285cfdfaf12efa46
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e44c41b67f1d1bd1e400bd6e4d5becd9
SHA1aa98393a68dd71f755442fce30589570b1725807
SHA256e07cd153749f011376cbfcd4ef2ca7125c3281d7bbbf14aff4a9f2f353f5fef0
SHA512401b2609a5a6b71231defdab2b7fab1773e02ade6a1149b651a0b2f27db511511efc057fcffd309317163a3f4279871f60e557bea24309502409d9774829c7a7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53035c15e59db83154778d4d186d3bb19
SHA1156bf28ed92d38875eae534eb50a891fe982f6c7
SHA256a72e529cfa8447a462fb266033834b05ca9982c1db88de152463c77a1e103143
SHA5128c46553ff50083cddc9c40e223d524c9c9c4de6fd86e82c42ddd8f8537b02d3d817186c8574f3143f5b6a2aa74ce23cae93ec2e546219d13b8948a073a201bd2
-
Filesize
4.1MB
MD57f97943a4052d43ceec059028b7bd791
SHA1a995e417536f67d9ae380e844682a6c685a595ac
SHA256399f3ed5f8121b200b3871318314e2bbdfbfbdd9083089b5bff37fafd8102625
SHA5121c23a7afa170eaf4dd1d21c5985a66b92e3eb3eb17e9079e1b2b8cbcd4b340d20196dfa36ae9f5cef28afe5a1b0b8509e19ea87114b43fc3d1f6edf2275b9253
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec