Analysis
-
max time kernel
7s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe
Resource
win7-20240215-en
General
-
Target
e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe
-
Size
4.1MB
-
MD5
e29c083b993670853ad8cc452b1cb4d1
-
SHA1
fce7f4d659a7cf6ca079fa26d30cbb185f9e676a
-
SHA256
e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44
-
SHA512
3937c2cd8e11722eac10b57b287b5340caa2604ef4f5be338f39e1d7fb8f9fcd82078503650aa4b70a2dfe9d3e1b3b7bb35c287c4e7f1683a574731d278e0fc8
-
SSDEEP
98304:JGrnwiB2dYFBQLVw0Jv37FWi1chPr/xRmmjECQgDNU:JG7LuY/yhvJWf/qmwCQmU
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral2/memory/4528-2-0x0000000004F90000-0x000000000587B000-memory.dmp family_glupteba behavioral2/memory/4528-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4528-55-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/4528-57-0x0000000004F90000-0x000000000587B000-memory.dmp family_glupteba behavioral2/memory/4528-132-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4580-131-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-219-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-221-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-225-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-227-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-229-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-231-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-233-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-235-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-237-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-239-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/2620-241-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3412 netsh.exe -
pid Process 1684 powershell.exe 2952 powershell.exe 1732 powershell.exe 1744 powershell.exe 1732 powershell.exe 528 powershell.exe 4280 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4320 schtasks.exe 3864 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe"C:\Users\Admin\AppData\Local\Temp\e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe"1⤵PID:4528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe"C:\Users\Admin\AppData\Local\Temp\e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44.exe"2⤵PID:4580
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1732
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3504
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:4280
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2620
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1684
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4320
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3472
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD524790c119df6646dcc76edbdc6fbdbf1
SHA1cd5cc9047fe0c46b056931cb645d1ded23482e83
SHA256c34e6e5d485e66110956040c511917da3aee9f52631bdb9d41cbeeef09947562
SHA512895dcd7a3e1d86c97fb399656c751fefb5577a22d1e2090070357d03a842d4bdda71c56b2071ae17ce606257a35566dc25379fd2eaebe72d4d8339a9a744bea8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fce7ea3b5a5ef91629d47b89e194ca1c
SHA134c6cb16cb27d401d7d33f4d0e6abde7126e8c53
SHA256d2722657c02fbfb32d5b70a37f36e18a4b9c7f291b9dc12648f54acb030c3ee6
SHA5124bf6bc2f42152cc27dd7a5f3d7e63e682293b0e9fd5f09767f22400ea682a67da539b381b382a0678784f3bd9e46ef9e6dab474a0b0e427e5f709d34701fa6b5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d5a74cf2f41e9955cb407793e7a74a25
SHA1cb134f504209276610b083b2d74b9f2442ce7e97
SHA2567d2849862234f2ef5369ac27248e1bc6312cde4ec2c3b9a1c1aa9bf888598473
SHA5127a5f4056c4b6f23d46bc9a5d96cb7da7abea5f9d9a0263192c748fed6b09a04b100a1655ff32a04b12b7004c3c5b3ad5ed1618e146c696985e8b3c434eae46b8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f2d3586b07f42adc7577d96fc06be5e2
SHA1406835c7dfa958fb21733efe6c32b3ce5cce6318
SHA2565cf331f7d6b95ae8068e209f452d550b88eec68052d62d83c707a6942b37053e
SHA512058a6b17531ae685ddf6a613086c165c46e2226037d49e04a51beddd8b70ed2478443eda6adcd6895db7929cf1095e8db30580aa9f911b5fd014739513623f96
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52d75cdadee026687ab6b4ba2e423679f
SHA13754e4a3e67e8ec5f84bad619c05dea26ce620fb
SHA2569824066836adf24f8a5b85749f66306c3bd9733314b7490a8cb03c910b118736
SHA512727565725c3d5c92d641aa41c3f5796e9fad4115fa5d378a71c00e8565fd256a826f96ff326cf71c68b438face545b345edc809289011ef3f589c47bcd707488
-
Filesize
4.1MB
MD5e29c083b993670853ad8cc452b1cb4d1
SHA1fce7f4d659a7cf6ca079fa26d30cbb185f9e676a
SHA256e31eca26eebc6c55841ba9012aef2e64af914e13d85be5eed4cfee7d18b7cc44
SHA5123937c2cd8e11722eac10b57b287b5340caa2604ef4f5be338f39e1d7fb8f9fcd82078503650aa4b70a2dfe9d3e1b3b7bb35c287c4e7f1683a574731d278e0fc8