Analysis
-
max time kernel
9s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe
Resource
win10v2004-20240226-en
General
-
Target
da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe
-
Size
4.2MB
-
MD5
eec0e6b96442a67c4258b06290620827
-
SHA1
c8505a39d02fd21fc1f7d13c14e1d2f98b42be3c
-
SHA256
da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194
-
SHA512
0da3675a00b5278a35281073eed654bc6638499dd0228d35f70f01e51e08d1a74d08105d8596e9784aee6a6d4b619f576d95da4f0e9f040b63a3d2228158edd1
-
SSDEEP
98304:JlPNnLMcliXgk6mZUGEiVLqbbhuqLV4AlEjP7y:JlP9LMc0wkDbEiV0LVIO
Malware Config
Signatures
-
Glupteba payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/4108-2-0x00000000050C0000-0x00000000059AB000-memory.dmp family_glupteba behavioral1/memory/4108-3-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/4108-4-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/4108-25-0x00000000050C0000-0x00000000059AB000-memory.dmp family_glupteba behavioral1/memory/4108-37-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/4108-54-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/4108-65-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/3676-67-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/3676-116-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/3676-128-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba behavioral1/memory/3676-163-0x0000000000400000-0x000000000300B000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 432 netsh.exe -
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 552 4108 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe 1384 4108 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe 2996 4108 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe 3116 3676 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe 1240 3676 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe 3576 3676 WerFault.exe da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe"C:\Users\Admin\AppData\Local\Temp\da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe"1⤵PID:4108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe"C:\Users\Admin\AppData\Local\Temp\da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194.exe"2⤵PID:3676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2592
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2408
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:2252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1596
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:448
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1692
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:552 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2468
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 7163⤵
- Program crash
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6043⤵
- Program crash
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6003⤵
- Program crash
PID:3576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 8082⤵
- Program crash
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 8842⤵
- Program crash
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 8522⤵
- Program crash
PID:2996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 41081⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4108 -ip 41081⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4108 -ip 41081⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3676 -ip 36761⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3676 -ip 36761⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3676 -ip 36761⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f79a7945e26c272ae91d186f58c12224
SHA16ae4c25f9138efa18bed966097ffb786b5588945
SHA256a1dae67dabfbb2dc22cf16f7d9fff1652a8882a38d14dba600241abbab3d026a
SHA512beb2af63fee6a955ee25cdd8e548b64b0ce40ef663b17297fbfe27eb8e95e7d3386e7d38592c702565bdad1619ff676c4edcff8f6f37145fbb630db4d03e2935
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e88669c446b9eda9d305d6b3396888f0
SHA10da5b1f74b6df3c19d41436f1491805ab1e1490e
SHA256299d7ead1b34fdbf6fc90171737e6a131929d3dbf2950287de78716479a2ee08
SHA5127e9b8378c801d6a74078c348d75924019a33f9e7ef4060d3385d8ea6c2831910dccb57afe7c3e7832b769c13338959df28e94d2408ddd2c4794ac05af77c1eba
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5396c4952436c08bd414d39b15dc4a660
SHA11ae6430426e048825fdfcf551102ee9ed5473b64
SHA256e1b776ade132aeb69af8bfccd4499a50dc0ecdaaf37161859861b25afb62645a
SHA512afc983269bc6e2a7fc9dd5bdda0f46cf27fd4758a153457e39267684b840b670eb23dc4ac9ba097acf21c17d9e09d1218a219dfbb892375408252e69a8d11aaa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55bd094df96aa0cbbf45d5089c8b6ca84
SHA1f6c9d426f11d02d4b52736c7e42a240227f37427
SHA2562f9d8f7847bf6846c59a49e3ddd6b6a9ed40dd2289b31469078072eb59345fdf
SHA512f7d1066ab8a1ed0408ff9de6557e7121b054ca7b50399b3dd5e8a37766929645f58693e7e58150e088ec2ae860aaa0a49884474f8acaa16938cf76ea5f4d7202
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56e85bae9eb5f7526fdecd016402e1219
SHA13fb3ee10abd8edd097e5e68c246876c9ff26372f
SHA25605b6990df7d107b0c842be0a4660866a27ad84fb2ed230aeb8656067ba232d0a
SHA51215e74d85ef9dbed063859dae91b16ac8f6416f02e663589820ec2a8880403339a7cc8f1dc3218f073ba662991bb39f3dc9c73bb64e0417fc4145a3a0bbe68578
-
Filesize
4.2MB
MD5eec0e6b96442a67c4258b06290620827
SHA1c8505a39d02fd21fc1f7d13c14e1d2f98b42be3c
SHA256da8e7aca7e9ffc825848b96f8b2c6e0869078ac0a044e98aed72c504a0641194
SHA5120da3675a00b5278a35281073eed654bc6638499dd0228d35f70f01e51e08d1a74d08105d8596e9784aee6a6d4b619f576d95da4f0e9f040b63a3d2228158edd1