Analysis
-
max time kernel
5s -
max time network
134s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe
Resource
win10v2004-20240508-en
General
-
Target
c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe
-
Size
4.1MB
-
MD5
5f3d0bee1362c6d0a99faf39ef80c1dd
-
SHA1
aa6b423c2293a29d08922f9414e7b6f1eb3e21ff
-
SHA256
c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb
-
SHA512
fce68dc66174f9872477e5a04aa9dd88fe426ff1298449d8e5e901a035652555f848f7787676a08b06bc2e15758a5eed863fd9a7c708aed5acf3a1b007f835eb
-
SSDEEP
98304:sQJMl/iXMhTmfDhNRe9xfYVEx7xkD10HZd3scl3XzHAtmo0FM:nb8hTmbBIxHPR3rn3oKM
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/4820-2-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/4820-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4820-54-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/4820-53-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4820-52-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4220-126-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-199-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-215-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-216-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-218-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-220-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-223-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-224-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-226-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-228-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-231-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-232-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1952-234-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3292 netsh.exe -
resource yara_rule behavioral2/memory/3292-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3488-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3292-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000200000002a9de-211.dat upx behavioral2/memory/3488-217-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3488-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4416 sc.exe -
pid Process 4968 powershell.exe 3232 powershell.exe 1856 powershell.exe 4512 powershell.exe 2332 powershell.exe 2096 powershell.exe 4664 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2992 4820 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1108 schtasks.exe 1776 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe"C:\Users\Admin\AppData\Local\Temp\c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe"1⤵PID:4820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe"C:\Users\Admin\AppData\Local\Temp\c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb.exe"2⤵PID:4220
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:4968
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2572
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3292
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1856
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4512
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1108
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:1304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1776
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3292
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:5056
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4416
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 8682⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4820 -ip 48201⤵PID:3948
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53ce9a2fa9ff4e473d0c9db414b72673d
SHA153dded869c70dbced70e35608f09283a751f9b9e
SHA25684a2c098e6b7a0c67c5dd812d11db37b75f4b8c57cbee959abb95655fc722178
SHA5129242c1a704fdc3905c217ff7452d1bcc1e9db0f97646ff9346ba3be9d94902b24590d2cee513ba8b9c6838f22caa1bc0e3722efdfcd9e27601790ecfa966accb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56fdacc69c7dfcfba017b9601f392c285
SHA14bbeab916ee19ca96b4409858e5106ba317edc7d
SHA256d6e44ad6fcc9516a178f1cd8520c8909079eb8dba816e0fed9fe721d0687ace5
SHA5120197910a4d1786d9f3ff30dd700e8e44c268e520966714d0c27b58da23c5a50c45b688a52e14b7d4a2d975359b0022887dd30521dc6e3c1649ead9102e5fe9c5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e7becf2147f64e65f3da28e4a62fb5ac
SHA1f2524db879afc33ce252c63e1002e6848972ba1e
SHA25687e23c8b27f9b6357d28d3b80c5fd5ddc092df2b90df8362cddf958a37886a45
SHA512a1119740871dda869fd5b168232c6a7073ed591117fe51603a569e63673a506a125d26f65a4a3db220f85268fe932985ad8d5c0edba09dae78f8a204c2d0ad20
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54de64960cdb0742af6ddd576a828058f
SHA17107ac209e8e33bbbe5a4833980c57d7fceedb33
SHA256f61b13daa2a9898fc7f81a13bdc9b79f37c1ea63ed2c1d75597bad5ea564011a
SHA5124c067761e4a07527b90f0cb37446642495e57ccd1c6f4b5a40ceb7babc6dee6751c2befa6deae66fa06fdfa8cb3d8fc63e1fad6af713e755b898970172c8dedf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5346e53a49127965b937c64c5b4b82cdc
SHA179ab249dd12360324dbff84b53d9942cb64fac1b
SHA256f50575e8047a4d1a9f0bc7d030ba99dca2acfa5019110195a341c7a18646e831
SHA51279228dea7ea762db50fa386aef9c04aa7eddd1432b21240d5e5d76d7d7da8b9840b637ec782e5277b2a13b31629ce7a7817ede5e84690aa5aa480805091f5e0c
-
Filesize
4.1MB
MD55f3d0bee1362c6d0a99faf39ef80c1dd
SHA1aa6b423c2293a29d08922f9414e7b6f1eb3e21ff
SHA256c1e2d1b2a3eaedda7957f1b5332c3023f114a99d51fe37f5a384923b92db40bb
SHA512fce68dc66174f9872477e5a04aa9dd88fe426ff1298449d8e5e901a035652555f848f7787676a08b06bc2e15758a5eed863fd9a7c708aed5acf3a1b007f835eb
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec