Analysis
-
max time kernel
15s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe
Resource
win7-20240221-en
General
-
Target
acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe
-
Size
4.1MB
-
MD5
8b0e4b4e65b5528dca8a21749e99ae9a
-
SHA1
469d535d798f72f04c9050bef1d07cc1140c3e42
-
SHA256
acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9
-
SHA512
9f3fdc6822ab125f2dd1ff66a5a737a75e3358914bb4e8f9641c3e4ba2c659d638a8db78a444c4ccccc231f5246f785327e6c9285c698544b4cf6106cebdb2f4
-
SSDEEP
98304:gtOQVOzVP2okCrzGcqr3Il4xEgG4B6nRnzx0Ffjivm9:eOQEwokgzc3IlsEmoRifjf9
Malware Config
Signatures
-
Glupteba payload 29 IoCs
resource yara_rule behavioral2/memory/1108-2-0x0000000004F80000-0x000000000586B000-memory.dmp family_glupteba behavioral2/memory/1108-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1108-81-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/1108-301-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1108-302-0x0000000004F80000-0x000000000586B000-memory.dmp family_glupteba behavioral2/memory/1108-299-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/4704-323-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/4704-1027-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/4704-1035-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1528-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1770-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1779-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1781-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1783-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1785-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1787-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1789-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1791-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1793-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1795-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1797-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1799-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1801-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1803-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1805-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1807-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1809-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1811-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba behavioral2/memory/2688-1813-0x0000000000400000-0x0000000002EE2000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2628 netsh.exe -
resource yara_rule behavioral2/files/0x000800000001abdc-1773.dat upx behavioral2/memory/1900-1775-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4636-1777-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1900-1778-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4636-1780-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4636-1784-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4636-1790-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2720 sc.exe -
pid Process 3180 powershell.exe 1528 powershell.exe 3004 powershell.exe 5052 powershell.exe 4460 powershell.exe 2788 powershell.exe 316 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe 3708 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe"C:\Users\Admin\AppData\Local\Temp\acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe"1⤵PID:1108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe"C:\Users\Admin\AppData\Local\Temp\acf724e1d60b08a3fcb84fd31ed8827e0e7ffed95acdd67e389d2adc23aaa7d9.exe"2⤵PID:4704
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1528
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2492
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2628
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:5052
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4460
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4348
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3708
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2020
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:2720
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5437c2431df8b3abe0cee5bd3603109cb
SHA1b5d65b118fb3675b1474b33537c56b8bf7dcfa4e
SHA2565b461d6429dc41811b381bbe67a973f137a3dd590fcf4c4b1b0aea4973d6cd79
SHA5123ff07380e0b2a1a56ae49f5c76834d6d7f23dfe6cf2b1cd92f9eeb6f3d3dd91f63104e23f53a40f160f2bf59f45dea267c94dba77af08a5bd4957a85adf0395a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57220761f971ef2ac2de0549e7209c423
SHA1cb74646c37cdc4ca801158fe461a8d5b8460cbb8
SHA2565f497dc15ab35352b221eb208a3961a053df6595872827bf912fecb62c7d39a2
SHA512318e3d573f29afc72a50036808d8499ed4ccb2a14a67fcf8d3feab2c77174f1826f6988bde953b9bd694c35d228db71b2aa8192554f1d1513101f2bbc740aa79
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5780bff0d4ebab81a42b133391066a893
SHA149d06936d20a12ce46d3b766489d9fd8ee14f4a3
SHA256ab63d7f8f3980edeff86bb37a95d87ce4ff16ec3ddb01962d13a55034bcda286
SHA512bd4ba54a11c84c25d194acd8edf00a5ab5e9044351f6d4b4618a9eab4991d8e0a7b55bcfb5ac69a5af823cd437ba3bf9d6c243e70be2429241eb9dec8d39399e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5cd81972dffa3948cf4d5a872fcd70f35
SHA1b4820477967f426e0c84c1da50918fd6e7423aa4
SHA2561036afb7371169f5c396b457871f9920262653a1c7f62a4bbd83b5095375ce6b
SHA512df980b7a9697252435933ac21c017eb78233437b7a645c0bde05af219f0d5d761a7237b1bc2106ea2e67c9d057c4be4b83b5520875cdfe62b434e1a267e0d515
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD547db3cea982daa08a25727f7d20a7a54
SHA18ceae9d3f437c1bfa1285716b9f4b739f9bb5f72
SHA2561fc08407cdbb6b182b75a0d7d4efedf638af2fa7254344f2823c81387ca2d775
SHA512b5d7ede26c3008a701269dc3286e1895b3045ed48bd21871568b3d5a2349dda6090ea99bb82517c870dba9dbb124866d74177e583d421e5c474ce1ef75581fa4
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec