Analysis

  • max time kernel
    43s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-09-2021 18:21

General

  • Target

    6c5db6dce13ded4e0e6c7e9a526b063e.exe

  • Size

    4.3MB

  • MD5

    1485d115c0db789ed882e6da39b845d0

  • SHA1

    b25ee4515f5a1a8b420e7eba38f233ee64a24755

  • SHA256

    036e1c48be2a9fde1e94334dcb1216eec8512b38c118234c118aaa47b6ad65c7

  • SHA512

    c8571df02ca3c8d69c49393d45a032a291c6f5c7100564e9a1337f287abd195c903bf86a20217990de38627d2a646dc7dde0e3953827afa94db270124c1f559b

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 3 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c5db6dce13ded4e0e6c7e9a526b063e.exe
    "C:\Users\Admin\AppData\Local\Temp\6c5db6dce13ded4e0e6c7e9a526b063e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\6c5db6dce13ded4e0e6c7e9a526b063e.exe
      "C:\Users\Admin\AppData\Local\Temp\6c5db6dce13ded4e0e6c7e9a526b063e.exe"
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-60-0x0000000003EC0000-0x00000000047E6000-memory.dmp

    Filesize

    9.1MB

  • memory/1640-61-0x0000000000400000-0x00000000021A3000-memory.dmp

    Filesize

    29.6MB

  • memory/2012-62-0x0000000000400000-0x00000000021A3000-memory.dmp

    Filesize

    29.6MB