Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe
Resource
win10v2004-20240426-en
General
-
Target
88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe
-
Size
4.1MB
-
MD5
44de4b4d95c61e9e0be947bd8006de68
-
SHA1
3c2e7e5ad27de2dae531d9e0663f59961ddcbd51
-
SHA256
88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb
-
SHA512
a8208c724dd570f567e2669ce1f766ac4757efed135de14c87df4e7e10c4a2282aa103906d9e39a8fde615cb47fddd4cc2c51bd9e1506bf3db323c5e772cd557
-
SSDEEP
98304:yf+oTi6061rsx4yGF2uQjPQS21lHMnsqkLrDDcuTdH2a0g7PFn:Bos8riuQnYS21lsngzdH/0gp
Malware Config
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/4788-2-0x0000000004990000-0x000000000527B000-memory.dmp family_glupteba behavioral1/memory/1268-236-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-239-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-242-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-245-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-248-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-251-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral1/memory/1268-254-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3052 netsh.exe -
resource yara_rule behavioral1/memory/1460-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x0008000000023448-220.dat upx behavioral1/memory/1460-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4032-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4032-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4032-231-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3660 sc.exe -
pid Process 1880 powershell.exe 2884 powershell.exe 4220 powershell.exe 2164 powershell.exe 1428 powershell.exe 4804 powershell.exe 3040 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe 3012 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe"C:\Users\Admin\AppData\Local\Temp\88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe"1⤵PID:4788
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe"C:\Users\Admin\AppData\Local\Temp\88365e9d60596063c013f6f7db123a7d8c51ddd4702c02e387c96254c2e371eb.exe"2⤵PID:1644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:4220
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2188
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3052
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:2164
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1428
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:1268
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4804
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3032
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4688
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1460
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4656
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3660
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD596b4884052ce694586f11e4366f56429
SHA1e935b4b036d3b39c52bd0c99085340812d43693b
SHA2567165e064757ad489e3f30e564fae7ed98170afe5901ddccba7e6ce8e2c604610
SHA512895b3e725147a8190b9311eda53cd4f9fee567ad49f8d88a5db8b9f365df496d2796960de10796c11672edb3877ae30da9188fc681ffca8537a35c8898889e15
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d20a0129d38d0073e63e21362eebac5a
SHA1a0a23f77f6dabb2fccefc99a178eca0b8798e5ad
SHA256aaf5540688fab16e7a488e5d15daf74dff6d38f1dd530d72ce96939b794fa5b8
SHA51214c48f536d3b901a9c5e8598552de883b5083b0f24f30f63c2ea82960e4d0432c504b2812f6e0f9ef50fcb74c7fdc791d370b4eb62f3c440f1ea9fd989a329c8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52bf03ff006aab1b671bd24d395cd0204
SHA1ee18b6d669d91c059562c1b92d02c07fab44a051
SHA25686861c222c561c03035750bd5c0d30bd0fb505c68c6a81e87c9f551229463658
SHA512591ef4b2a3ae1038bee181b73e40a9d0326f20f1d9c1b3bceaec9d472a41aed8e0a8b18caf4e9dff2e6f0aecf51f4c49bc4d8404eeae7acfcb854007fd39f7a5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c9dc5fb56002adde03ed1409ba6d8038
SHA193cb72eb7e4f61cbd8a79cc29c377c129bc68e51
SHA256571e493fc31a7e40567c593abfec8855369e931e34fbdd5883f00071f0460689
SHA512d6fc4442c97d9bebb51c74a01f2a1393931c83bc70718fa5f8fd9dd9366cbb2b6755c546d1acfd0b6020cd0e5d8c95249ebc597f4bbf233d742ecf24a6594e54
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5568ead5e92b50603db773df34266d108
SHA1cc31a8bfacf5e0fb7ae91327f41e4e2f93a6217f
SHA256e530038222e243415f0f967ed7b9dd7f82097fd4b8445701182163e92515203d
SHA5125fad93ede77f8364a0c1a6a695a40db7759794fc2fa6d766f1f2ca347e9e28bb2c00ca51c3307c25847e4891a50105e13df57912155730adef0f95aa87d7d763
-
Filesize
2.1MB
MD54fa18ade770cfeb20b0090773092630c
SHA1b5b95d85b4f991ba8b11aeef1f59afef0604f6f4
SHA2565bcede8d7748ce77dbda7f45c20244297de1ad5ad2ba8c68a27e625ed2ee6996
SHA5129d882302a8934c534d8c80596a0019a5929040c8bf8349f7df8862410a969252b22b1a522a7dc40d808a63c171a5590ee05673f7b1c9de983dc100d3aa90c9e3
-
Filesize
448KB
MD56165bdbe9e88707a2b0d358c40577d0a
SHA1c73cf98e599a74d381d60f1ed1273ac73dba6185
SHA2564b0e8a382d545be476d82909a086373ff54cb09b601ab25830602ea123900c2d
SHA512c9112344f55ea316c938a7c1e8588137a8ce6727a5e06733f677d22ccce9855a164ca61961e7733daead2cbf9c91d523c7ae177f5c56571636b197759fe520f4
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec