Analysis
-
max time kernel
1s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe
Resource
win10v2004-20240426-en
General
-
Target
e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe
-
Size
4.1MB
-
MD5
b72a05c666edee4876ab8ceb408bcb1f
-
SHA1
5ba470aef5c716042678b369e3bf13d00cc8fb7c
-
SHA256
e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1
-
SHA512
0f623072b94ff70844a37ee310abff2faea3955c8fa271ac6a7a60c37cb9d7b3cee57e731abd787a39bbe8ba31def63c5c57de4b91b3758d47187f5a16ad16a6
-
SSDEEP
98304:CQGLdTw13YmTlGi/xMFRAVNS6wnhY59m5e0z8345H:CLpT0YNaxn5wu5s59Y2
Malware Config
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/4836-117-0x0000000004950000-0x000000000523B000-memory.dmp family_glupteba behavioral1/memory/4676-216-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-227-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-239-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-243-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-251-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-267-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4676-271-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4260 netsh.exe -
resource yara_rule behavioral1/files/0x00090000000233a0-220.dat upx behavioral1/memory/1996-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4080-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1996-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4080-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4080-237-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4520 sc.exe -
pid Process 4204 powershell.exe 1460 powershell.exe 428 powershell.exe 3280 powershell.exe 3152 powershell.exe 5116 powershell.exe 2276 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1836 schtasks.exe 440 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe"C:\Users\Admin\AppData\Local\Temp\e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe"1⤵PID:4836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe"C:\Users\Admin\AppData\Local\Temp\e0db4410289fb1727f206846a566d2687982266a747359bcce2dbc9675c5b1b1.exe"2⤵PID:5040
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1460
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:5104
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3280
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:4676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3152
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:440
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:5116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2036
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1836
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1996
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4144
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4520
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d470ccbde95bbccd38376fad0856e2d3
SHA1c406ddb2fe200280f7f38a76920d4033cde5d2ce
SHA256125f03776e8fb16ab25791b164b1bc34a4754e2d2b62a50378f5e07ca19b4ad5
SHA5120434b0fb93d2564743395a9d4f41a4e7ca44674cde29306aefe8fb31faed61a3a6f86e5cb541a0b7d33e58a67f0b818db959dd3a191c131c060645fd95a67cb1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e550514372648986ea69e1695d2c599a
SHA1381a3451999a4c1ffce7850bc3f895dcc6cf2f7d
SHA2569b6b9132225eb277b433a7df60cbabb42de40349917ab45c9f396430281ca560
SHA5124df6cfe46d0bdf390fcfd236750a34474fc80fd8667cb173c41e051200c680ebd489ced6920a7fa752b75fc407e79fb93949d1b8344dd7117731ba9932a94d72
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD571f9c36a74b43bd3cf7c353577be97e7
SHA1b67eaceb24a97b57c579631fc0cfac074c88c1e6
SHA256f82c6331b8a44ffba4ad9f3ae683fec301459f07d9e4228252f466327eba0d48
SHA5127f6dec3a20194d75051652c186d99c19f3bd4bb9e33d07ba773fd38a10898934ecd4d869a35cb4044f2e0bb6d7285bc716ab2778f1826a8bf741dc9588a13fa3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5461805dddf17144b9e4e22c1d80f7dc0
SHA1592cdb746b85a2f285ad753f4f4a8faa14519401
SHA256497ad5adaa3ad503148fc205ebd81b6c9e4a4e29fd5f624e1f8835426ed719bf
SHA51215a281985158fc20eaa04b7cac9a62493439a2c7d2535ac3104a005ed007f80e11b6bb47837f121ecffc23bc187ae4206d9b1ef088b7402f02fc97d2951f73a6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55ed0d242babdb09d3b658b485e97b690
SHA1d9943feb0d94d6cd284b08e9d506f33c7a5bb4d3
SHA256bd704040b991c64dbc7adfee3457124453f2900bd9a2694a6fe5c35c5be6d810
SHA512e23e57384484935f7799f961e697777f3612b50c5ceab84ed72971e2073a298a885b56dcf60153955f94c72ec296fecdd85cf83d1ad42ffbc11ccfb736dd65ee
-
Filesize
2.1MB
MD5c5333a76e16f0570527e8c7256a0e13b
SHA13fd24cf50817ad30e8453a63d685af2f07454490
SHA256740b5f1bd12033a36810f92b28b21689c8a5f4ebfb4f5dbf60722176d15d29c2
SHA5120a3df1e9ac3dc456dd60f908cb9d9ae547e7cb20f09d12827dae34f8f51a0abdf4450a80ae42ba123d8d18de5d11601e8fcac3e59591933b942b0aeed2c0675c
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec