Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe
Resource
win10v2004-20240508-en
General
-
Target
de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe
-
Size
4.1MB
-
MD5
7a3187474038b262c80eb70b55fd6f06
-
SHA1
73fc124403942d3207214a23ba4bf4b8f7f0a913
-
SHA256
de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3
-
SHA512
b39989c1f40810ef980bac8dec49fbe356fedfbb620962d3037b667d81b42ea565b4329c82880da07a175bdc65a4e7fb715b15176faf9e2fbd8d7d4d55460414
-
SSDEEP
98304:7mSOHuT7egJLhRTCVEkOCdqjiWtSbuAFmh921:70ObLh9WfG/tSdeC
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral2/memory/4932-2-0x0000000004A00000-0x00000000052EB000-memory.dmp family_glupteba behavioral2/memory/4932-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4932-54-0x0000000004A00000-0x00000000052EB000-memory.dmp family_glupteba behavioral2/memory/4932-51-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/4932-53-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5004-126-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-204-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-214-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-216-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-218-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-220-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-222-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-224-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-226-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-228-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-230-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3440-232-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4512 netsh.exe -
resource yara_rule behavioral2/files/0x000200000002a9e2-208.dat upx behavioral2/memory/1860-212-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4512-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1860-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4512-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4512-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2728 sc.exe -
pid Process 1956 powershell.exe 2332 powershell.exe 4216 powershell.exe 4180 powershell.exe 3812 powershell.exe 1428 powershell.exe 4252 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe 2392 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe"C:\Users\Admin\AppData\Local\Temp\de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe"1⤵PID:4932
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe"C:\Users\Admin\AppData\Local\Temp\de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3.exe"2⤵PID:5004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1428
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1828
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:4252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1956
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3440
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2332
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2860
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:5032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3936
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2392
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1860
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4944
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:2728
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51c14fb62d471e7fff3eb0d446dc878d8
SHA111c1be668ee07e839ea0541cda7c9b642c25444f
SHA2567842e641bf15fca42ee7ed8a745eca399b9d115513234bf9cea7902680bd5973
SHA512178cb1b4ab09fc8dc81b7973e6207543bd5274088c8ed45b7cd4af48a0a2ba5bd62ea0f62d09f76788445bf8d5234e8684213ecfa4d9924da6948423b661a937
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55daad8c54a9f32a1f1b12fde3b782511
SHA183e821ebb085125c359f12eb8a9c76472a4ac47d
SHA256c3baa772cde4526d34377dead7023e43b5fae7fb8a1f9c8705b3a1a3c5d70854
SHA51254dc7de11a434a1a64e5f06f879179fbf1b901aac68e25d5be45deb697920658fcc24147735da7c05e3f8f2a713e3b3430ef83d359461eec12df6e5a2488daa4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD566ee13490026e5dd6ac6b03c2fd59cf3
SHA1cc0acea36588145fad1e4d021e13b364de2f3854
SHA25639f358b2b62f6dbdf1c7526b4953176988c2251c286c4ac2a54e71d10aab4f27
SHA5121e62c1016bb70444ec4f7a938cd43a639d02f0575c43517e466a02ae88290917ef3d2771c61819e69daa81e46d1465d46264ed61599cbd2a4046067ff006a013
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56ae1b41b75bee7e12a1bc0151ece4294
SHA16242aebf889acf514c3b69d579309e8586649d47
SHA25647056c1bc90c1c9e22566540feccfdebd49f7267e6c5e5c19c716374b3b15952
SHA512d0eb5f71c9d890a4a00842c921f0a28df499113224cd928e2a78d6d57d295b9eb8fa41ab25edb564da8166ad6ca40e383d32fd12e546b6355f18423d900fc198
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ce29d66b5f104f3e767f3cab9756671e
SHA11ba084f093f1d1a2ed7c754ac8f1af0b444ca5b3
SHA256ae869f87cb954ea5139c0da3d7cf05bd9e5ad9f078de422bd1beff2873f3140b
SHA5129114c094e5e05b6e57041730a120e54dc502537a580c56e0e4073eae6cc62419fd5c6af79bf2b9424c8627693590f1bb60ceabc8d332785fb9dcc0e5965bac6c
-
Filesize
4.1MB
MD57a3187474038b262c80eb70b55fd6f06
SHA173fc124403942d3207214a23ba4bf4b8f7f0a913
SHA256de991298b019543e07054a5b47e67655266b9552ea317eda901968756febd9a3
SHA512b39989c1f40810ef980bac8dec49fbe356fedfbb620962d3037b667d81b42ea565b4329c82880da07a175bdc65a4e7fb715b15176faf9e2fbd8d7d4d55460414
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec