Analysis
-
max time kernel
0s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe
Resource
win10v2004-20240412-en
General
-
Target
c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe
-
Size
4.1MB
-
MD5
770dcf67f02bc05f62f6efbfb114c652
-
SHA1
103f33dd662314339bd4d21a386e8a377ed5afe3
-
SHA256
c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4
-
SHA512
9a376f917bcebceb3f849fefd86b59e33b501f58b60f322f014d38737afae1fb14724d6a9ac2d534fd33590da54a8445c6f4b683e6279d26f3c4eec3c2a7c6bb
-
SSDEEP
98304:1FddrpuoRE7tl1yJ8vae/QmLpm2XHwIZYQzHZc5g5rp30lCUr:fLdBQ1yJ8Sedm2XHUQNc5Xgi
Malware Config
Signatures
-
Glupteba payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/2380-2-0x0000000006700000-0x0000000006FEB000-memory.dmp family_glupteba behavioral2/memory/2380-52-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/2380-53-0x0000000006700000-0x0000000006FEB000-memory.dmp family_glupteba behavioral2/memory/2156-144-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-238-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-247-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-249-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-251-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-253-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-255-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-257-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-259-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-261-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-263-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-265-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral2/memory/3076-267-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4564 netsh.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/3772-246-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3036-248-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3036-252-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3036-258-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3084 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4600 2380 WerFault.exe c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe 2888 2156 WerFault.exe c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1980 schtasks.exe 1348 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe"C:\Users\Admin\AppData\Local\Temp\c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe"1⤵PID:2380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe"C:\Users\Admin\AppData\Local\Temp\c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4.exe"2⤵PID:2156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:972
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1008
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3084
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3816
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1736
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1980 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4080
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4188
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1348 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3772
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1508
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 8683⤵
- Program crash
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9442⤵
- Program crash
PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2380 -ip 23801⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2156 -ip 21561⤵PID:1788
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5be4a33695ccbd5201600e35bf69efa07
SHA16d1573fe991e739b9137bd113d2ba6d65f3ff056
SHA256a4fc0332e41eccd7abebd892dea6a0385d91a61dfaa0efbc40225b792f0c4913
SHA5127cc095402d516949b2a421218aa8de5940740c22f7b357438ea958096a1bca8c6b961946160519abad87dedefa8e97374c1de2b57cdfc4c5d387e5508eddd43d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50b5fc0ea9ec4b1dd70862bf97b4e55f8
SHA178d3749c68c9477b9779f7c17c689cafe38c9816
SHA256a8c83fe8eff843531e15ecc33ea63addbc2e4bd3fff129a3b8d06c971216e09c
SHA512330d351f0ad5b17ab923ac69df6174132195e56556260be546f65a11ca86d8a62b93104e3ac0eb1292c271a3c216f15babfbb08288f6a4a03375c1d4a218aa87
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51af9ef9fc095fa4dbea2787d04349028
SHA1890260857f194be0c004ac5ec2c3bdbe58bf506a
SHA256d793e13a462f0b0239e63d12184a6f7579227ea1f321d360d613b6a8434d1e7c
SHA512d589023c82e77863a82b3749ce050392fdc57e04ad02c9c90ed7111f74625d8bb1c88a24333d4135c37af65139ad94d2fb536dde8a9a2ef48106a374665383fc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD550d8f5f05e61bf51366b42f9dd686ecc
SHA12dc542cf1e18fde9ec920ecc6acb3c7264f2adcc
SHA256405547f3b15ffe4d8abe14d3284f3a00ea0957095bf68274f1af080fbd0ada17
SHA512c526bd6032871f55c1a2e25be19ede0302bcd90db6e2e0f1317201e8358f9cb777834f4ad18670360d98104788f36972f16e9fa803fe6a0ea9dc5cad8b2e50b4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54bb0c5e6082f7c58161c7e905615b19f
SHA1c21e1c15f8fc315145afcb644289cc4274ea2396
SHA2562f6886db8b0ab78a835df80a059713ff96b3504d362a44950e5248810918432c
SHA51246b86e954b51d9539f73a3812e2abd080cfab8d071bf7375fdc0fc8ce9960c9b0d58f413bd46c2437ddb5cdaee29afc3f4a572aae66542781a02eab238f4ab51
-
Filesize
4.1MB
MD5770dcf67f02bc05f62f6efbfb114c652
SHA1103f33dd662314339bd4d21a386e8a377ed5afe3
SHA256c5120bd41a0da73e236cb8b8eaef6331a6d7a787b616a5d842efbcd794bfd6e4
SHA5129a376f917bcebceb3f849fefd86b59e33b501f58b60f322f014d38737afae1fb14724d6a9ac2d534fd33590da54a8445c6f4b683e6279d26f3c4eec3c2a7c6bb
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec