Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/05/2024, 21:46 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe
Resource
win10v2004-20240426-en
General
-
Target
4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe
-
Size
4.1MB
-
MD5
452b6c70c86f7ad78c84af5407d4c769
-
SHA1
240f462eb3e7d06dfc3b7aef55684e3c48f47c65
-
SHA256
4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788
-
SHA512
7ac958df103493e28ed1411de2259b658ee07ece24ee3ddf0c754570a4d4d0466aeb2b92bfcb15180efe4a91d03ce8d4a85dfb1b367618eda1e10e6f9a43c25a
-
SSDEEP
98304:UX33DbWGkLHuFK+TwQmBC6reQ4TTNXYvI8KgvjrB0r/:UXPWAwQyCdJYw8Kgg/
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/3884-2-0x00000000048D0000-0x00000000051BB000-memory.dmp family_glupteba behavioral2/memory/3884-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3884-119-0x00000000048D0000-0x00000000051BB000-memory.dmp family_glupteba behavioral2/memory/3884-117-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-193-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5096-192-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-201-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-213-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-217-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-221-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-225-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-229-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-233-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-237-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-241-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-245-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-249-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3496-253-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2768 netsh.exe -
resource yara_rule behavioral2/files/0x000200000002aa3e-206.dat upx behavioral2/memory/2424-207-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2424-211-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5116-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5116-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5116-223-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 416 sc.exe -
pid Process 3772 powershell.exe 2268 powershell.exe 3588 powershell.exe 1044 powershell.exe 1720 powershell.exe 1884 powershell.exe 652 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 812 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe"C:\Users\Admin\AppData\Local\Temp\4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe"1⤵PID:3884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe"C:\Users\Admin\AppData\Local\Temp\4c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788.exe"2⤵PID:5096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1720
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2256
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2768
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:652
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3496
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2352
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4748
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:812
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:5080
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:416
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:5116
Network
-
Remote address:8.8.8.8:53Request1431ea3b-5546-4ffb-9dc3-aa6ab2c9bdb2.uuid.databaseupgrade.ruIN TXTResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requeststun.ipfire.orgIN AResponsestun.ipfire.orgIN CNAMExmpp.ipfire.orgxmpp.ipfire.orgIN A81.3.27.44
-
Remote address:8.8.8.8:53Request44.27.3.81.in-addr.arpaIN PTRResponse44.27.3.81.in-addr.arpaIN PTRxmppipfireorg
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdwus17.westus.cloudapp.azure.comonedscolprdwus17.westus.cloudapp.azure.comIN A20.189.173.16
-
Remote address:8.8.8.8:53Requestcdn.discordapp.comIN AResponsecdn.discordapp.comIN A162.159.133.233cdn.discordapp.comIN A162.159.135.233cdn.discordapp.comIN A162.159.134.233cdn.discordapp.comIN A162.159.129.233cdn.discordapp.comIN A162.159.130.233
-
Remote address:8.8.8.8:53Requestcarsalessystem.comIN AResponsecarsalessystem.comIN A104.21.94.82carsalessystem.comIN A172.67.221.71
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestserver15.databaseupgrade.ruIN AResponseserver15.databaseupgrade.ruIN A185.82.216.108
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.229.48
-
Remote address:8.8.8.8:53Request16.173.189.20.in-addr.arpaIN PTRResponse
-
1.4kB 6.1kB 16 18
-
1.6kB 5.4kB 13 14
-
89.6kB 1.9MB 1508 1436
-
1.9kB 4.7kB 11 13
-
1.7kB 4.5kB 8 9
-
378 B 654 B 5 5
DNS Request
1431ea3b-5546-4ffb-9dc3-aa6ab2c9bdb2.uuid.databaseupgrade.ru
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
stun.ipfire.org
DNS Response
81.3.27.44
DNS Request
44.27.3.81.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
20.189.173.16
-
200 B 398 B 3 3
DNS Request
cdn.discordapp.com
DNS Response
162.159.133.233162.159.135.233162.159.134.233162.159.129.233162.159.130.233
DNS Request
carsalessystem.com
DNS Response
104.21.94.82172.67.221.71
DNS Request
48.229.111.52.in-addr.arpa
-
221 B 388 B 3 3
DNS Request
server15.databaseupgrade.ru
DNS Response
185.82.216.108
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.229.48
DNS Request
16.173.189.20.in-addr.arpa
-
48 B 80 B 1 1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5813181ee586a3cf8dce41dd44ac66b1c
SHA1e60d96df5de49df6eadb7969c70b060d58ecd634
SHA256f536c498d1ca92ecdb4f79e66aceaf846c3d816542bfad7744f084c3b1b7f343
SHA5126bedef49931759d1c19596f7614cf733abb358acfa883d488e1eed3bba12025d04b6dc042facd5cff46a6e1fb2ec2e22567c7d73670cd07655a159511bf54ced
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fa9c9fe3520222a5b1b737e94f543793
SHA1173048e7b26eca2c6fcafb6e6d168e7a902e625d
SHA256d533edf5d710a0d276f73a452a2719fcf841e85d25a9194a7da0e61e2c6de347
SHA5120d7ce06c01dc9dc8a6a445ca71e67f224c07a3f49a175730fbc90eafa28b2ede2bef542b0a0ddf14460dd0622dd785368044a87bfdc7d6c6144d9f58235ab9c0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD540b499c8dd4c0bc8d6a4435417bd56e7
SHA148329f8bced4fffc30fc3d12df96c42af828bf5f
SHA256604a12a2eead0ac9d1b8f6fbf04eb7a91e0471468263a3433cede4bb2888cc0d
SHA512e4cb9f53c334e2545a2711549b8cf26354713507df6070dcaa64fed94414d2d9edf80f5bb14d8f6fd122b781b2c4c54a4370e8dd835d0635bf698e87e38dfaaa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57b948ecb238d67d44a14d5cf3b5b4ebc
SHA1524289b8fb8b21d7179d55bbb34c6ff0355ce71a
SHA256f9d94fd8f35a125a1ef764e85789a4354fbb20d81c6d4467f8efd677e2135582
SHA51271d25077a9bff68c3ad12e66f413bd97f527274146829bb6921798edd17822f7dc1c9c75c4827f94703bac654ce33eabb5105781452c3ab9dc4dda3796aeb0e5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c59c49e4716dfd2b055f75c6057bdf39
SHA171c2b91d6ae480ff0ee1b2e831ee4053755cceca
SHA25653cf5549ccdf9aa9e3ab1d5918245951e1b25ca93a1412b8309f82d9df257641
SHA5126a08a1edb874f6789fbd27f89a21d81b6f06a21db7b8a15ada434c72cb5bc95ac539b5403130364634f64110655db7467807c02bdd71df82119be1bd9f44a7b9
-
Filesize
4.1MB
MD5452b6c70c86f7ad78c84af5407d4c769
SHA1240f462eb3e7d06dfc3b7aef55684e3c48f47c65
SHA2564c71ce019072db6763adc78098d30159743f6dd1a2672b4f743392352acde788
SHA5127ac958df103493e28ed1411de2259b658ee07ece24ee3ddf0c754570a4d4d0466aeb2b92bfcb15180efe4a91d03ce8d4a85dfb1b367618eda1e10e6f9a43c25a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec