Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/05/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe
Resource
win10v2004-20240226-en
General
-
Target
504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe
-
Size
4.1MB
-
MD5
ad92e0df2eddb685d70cd83689ddf27f
-
SHA1
7346fa89928b0b26ee96fbdbc137f205af588961
-
SHA256
504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0
-
SHA512
ccf560596ecce815eaf9b1779102c10152dbf9e5788f3497b7e51ebff91bfeb1476f3935364d45525730b646bacafe89d3f8ece9d23bea8cd788bbe0ee95bf5e
-
SSDEEP
98304:BsVQ+hudF4keJeyEqK0evsENr9r54Wa5Cc1nHXivv:Bs5hioeyE6OsERj43nc
Malware Config
Signatures
-
Glupteba payload 15 IoCs
resource yara_rule behavioral2/memory/2924-2-0x0000000004A40000-0x000000000532B000-memory.dmp family_glupteba behavioral2/memory/2924-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2924-126-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/2924-163-0x0000000004A40000-0x000000000532B000-memory.dmp family_glupteba behavioral2/memory/716-187-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/2924-193-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5016-195-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-211-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-223-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-227-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-231-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-235-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-239-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-243-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/5016-247-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2488 netsh.exe -
resource yara_rule behavioral2/memory/2568-201-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000200000002aa1f-202.dat upx behavioral2/memory/2568-205-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3228-204-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3228-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3228-217-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5116 sc.exe -
pid Process 4908 powershell.exe 3776 powershell.exe 3904 powershell.exe 1016 powershell.exe 888 powershell.exe 4920 powershell.exe 4896 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4364 4908 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 3776 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe"C:\Users\Admin\AppData\Local\Temp\504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe"1⤵PID:2924
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 24723⤵
- Program crash
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe"C:\Users\Admin\AppData\Local\Temp\504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0.exe"2⤵PID:716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3776
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1428
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2488
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1016
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:5016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:888
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3668
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3776
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2488
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:5116
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4908 -ip 49081⤵PID:2476
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD563fb2280dfb243a8747ffddc4c08b20c
SHA17aeccaa802858eeb121f03224edfd3d404e11a96
SHA256ad1b140f227302350f57ad9b8f641a21557d4e0686ff880f1310fffc37d32813
SHA512be78e9d7b3184c6d2285df3cad870c051d5770a6c2d37886bae6de81e74e99884d6c3d4c8e56c04d98dcde2f8fad5050981a5086b5f097942b49eaa7b92e8a55
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d5378a7a78d5f5987589e0a0082651d9
SHA190e79cad71752de4249f26b379bafe90e2fc7089
SHA2560bd994b2dc72b1fcbba2128b24165720dceb30ec1a6a69de0a48a24b87ce1dd6
SHA512f435e32638c6b92719620e9ba388422a949af204131eab90a64263b6ac525bcc256ff6f2515244749e531ae187eda34be33a523bfee39116e3da4d89aedbcc58
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD505fdada518916d65a427e093cfd4ebe8
SHA17f3c96595b381156d3c0028e683649f480e9ed06
SHA2566a6accc2972d07ee685c663be38cc1b73754043afb2dae4795afe80893caa0d4
SHA512f5a90e38e5324e54327c3593109a6a83f66bfac8e7014cf786cc99502da9812c5c6fe201b08c5faf6faa947e7f52a4c81a422dc661630c33aa5c9b39eede357d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e9ba71ee958ebf8e1e9a003a660cfe7f
SHA16c709f8168e78a848cbfd69ad2ddb43637420d57
SHA256279af5af43f673dbd46e8a86a2366abb20ba836c904a816b85f49fa48bbe55e4
SHA512c525760d0e0542afbd86f1970d83ccbe12b26d80437bcc3f846a51659536236463e537a865244578e24855368beb9c35cf917b7406cd1739ba1777299a3860bc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56c6f208eb7f7d08f1e52af07dd0036f9
SHA1c6b92b6ae429a3e4a3b64b38290c5c5b92bb5551
SHA2563588776fe0172fed563ca9b276f73e276b29b93fdc4926b0a8391ea1af72993e
SHA512ebed987812d19ecca97dc3399b760d1bd113d9d3a6052690756a1a15539e49a767f1559f63d887ea65fb6751456731ab70005ec171d18f049fc931a594e428ee
-
Filesize
4.1MB
MD5ad92e0df2eddb685d70cd83689ddf27f
SHA17346fa89928b0b26ee96fbdbc137f205af588961
SHA256504b3f2e3747da0d4649bb03f1e1cfa74e1fc35d40c67b5fc602f9a77bae2aa0
SHA512ccf560596ecce815eaf9b1779102c10152dbf9e5788f3497b7e51ebff91bfeb1476f3935364d45525730b646bacafe89d3f8ece9d23bea8cd788bbe0ee95bf5e
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec