Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe
Resource
win10v2004-20240426-en
General
-
Target
4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe
-
Size
4.1MB
-
MD5
79c4b7b79965a19b16a9dc7371644238
-
SHA1
17771e84fba4c0f9097bec8c3f93b2ea43795ddd
-
SHA256
4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4
-
SHA512
99bc7718b9d492b1a22023586ac7facbd2385d0b85d723efdf045d5b6ba336058c1cc414ab812bf042034faf0c5bf9743093426cdc0eeb68b27628083135542a
-
SSDEEP
98304:yf+oTi6061rsx4yGF2uQjPQS21lHMnsqkLrDDcuTdH2a0g7PF8:Bos8riuQnYS21lsngzdH/0g6
Malware Config
Signatures
-
Glupteba payload 5 IoCs
resource yara_rule behavioral1/memory/3008-2-0x0000000004840000-0x000000000512B000-memory.dmp family_glupteba behavioral1/memory/3008-214-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4116-248-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4116-260-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/4116-264-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2108 netsh.exe -
resource yara_rule behavioral1/memory/3760-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000800000002341b-223.dat upx behavioral1/memory/3760-226-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1668-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1668-230-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1668-238-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4188 sc.exe -
pid Process 4560 powershell.exe 1804 powershell.exe 1460 powershell.exe 1400 powershell.exe 4436 powershell.exe 1960 powershell.exe 4856 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe 2360 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"1⤵PID:3008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"2⤵PID:4216
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1400
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:4052
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2108
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:4436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1960
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:4116
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4856
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2468
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3364
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2360
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3760
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4260
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4188
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ed21df59d08f629d11d2347ce840f910
SHA11f11035f9d5311dfe304843bfc285e8b9eb3a0b6
SHA256d4100287bbd57065d851202819d608ad1f58c3a9425c06737af1d8fa3b5a9185
SHA5125c6691233a1212010277c431066a20490ac7009f49b2a3e9557550a8ea7b42d058726fc2439cbcb0bb18c8ef36d18a467cefdb8f948a0b45a4e9496269cae8ad
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5555fa0cb0c50748a926b23b70df08fae
SHA1e878e0c29dbff0a375af12663652df63f3151070
SHA2567e2e2da2970d16a72cd83049f18e048baddb7ff4461f0a6a2a21cec006090ea7
SHA51283e3bd08e6eeeb53361a1c1a76b93078cd6cc39b48a9b83588f99877cc510c306190090bf80e68cc32fdb92abcc96a7b21f444e5e824f26a8a9557f49380dc3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD550aa4a9ff389c638271e5849de5c4f08
SHA138b52201dd62c3e647f62cc91ed378689b603f06
SHA256fdf67fa6d2af41e5703e123233d19b804824cc71e4db93ad75606cfb1b71f180
SHA512d770fa631c7be978dc1698c21d156abed31553c906cd9510508197ffb6d23b3f4e092d0ea8113220f8e1b379f8c88a5495deacbb8eb5c23776e80c9f0bf7d0bb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e168f297afc58efe8298411be6f3048
SHA1f28e4f215c2da7ae5a8a93909d4d586970a46a4b
SHA256a836e9f79b8c0f50018adc00ebbd328100430d793447b37f0395f24bada2d1c0
SHA512a07f8f3ffec3ea540613ce4659f6559ecffc113659c153b8c3e6278923a7db0b62c174bf1c8008414d899eaac5b7a1250bfad7c068913500b21c4843f59b3f00
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59a1186899545e6cfe1f09eef7fc93c6b
SHA1b9884b9889d69f55da3ae1203fd44d9dff583596
SHA25623aca3f6faa392290fdcc4ee5f6a6f9949b31bd8688e7de7afedc7900d98002b
SHA51280f3e9e01b5cbcc544c305e374af4e0459ee52142eb3c3d474c8f7d8f56f068e9f5ef92574d139022abf6d2aceca965e59d09b697e162cc4a45c07c8c8fdde26
-
Filesize
448KB
MD56165bdbe9e88707a2b0d358c40577d0a
SHA1c73cf98e599a74d381d60f1ed1273ac73dba6185
SHA2564b0e8a382d545be476d82909a086373ff54cb09b601ab25830602ea123900c2d
SHA512c9112344f55ea316c938a7c1e8588137a8ce6727a5e06733f677d22ccce9855a164ca61961e7733daead2cbf9c91d523c7ae177f5c56571636b197759fe520f4
-
Filesize
448KB
MD5eac3c94e166a4ac3e7d3dbf26d505ebb
SHA1c231e723ad6077f9b6bd12c5e7bd3fd208f7fa45
SHA256662eb9030b85d481e53772eb13a1b747a62bc68a862e0e4ba90f4e6acb3fe124
SHA512b5b0f2d3205ebf43593ae73318cc078b5eafed92be6c8d113cf0e7dbef9f84da759301393b9528ac7f11b2f82dd8a190ad5c2b9066c84afbc1c9fb775fcff1a0