Analysis

  • max time kernel
    90s
  • max time network
    92s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    25-09-2021 20:21

General

  • Target

    5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32.exe

  • Size

    4.3MB

  • MD5

    155b6831c5e93352df25dc91730acc31

  • SHA1

    222ff9a86989568abd0dcacedfe97f3cde4cd7ca

  • SHA256

    5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32

  • SHA512

    ef9ee9d5c85948459b68e0f3413dbbb44dd5a6e2fe005f70046d346ac6d963edeeecb9ff7cf290d32a63fb172a1fca1cfd70c17b6ee602ffcbbe8fdc6d961b31

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 2 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32.exe
    "C:\Users\Admin\AppData\Local\Temp\5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32.exe
      "C:\Users\Admin\AppData\Local\Temp\5db696e6c30d99085b3f446e2713b5b2903e47c584b935ebc8d1b3a8e0312e32.exe"
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      PID:2248

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4016-114-0x0000000003280000-0x0000000003B9E000-memory.dmp
    Filesize

    9.1MB

  • memory/4016-115-0x0000000000400000-0x0000000000D39000-memory.dmp
    Filesize

    9.2MB