Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2023 09:58

General

  • Target

    e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46.exe

  • Size

    4.2MB

  • MD5

    11ab111ec46b24ac0e8822e3f1a88ffe

  • SHA1

    80ae5ba81f6edab19dd3eefdab3de31ffd252ba0

  • SHA256

    e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46

  • SHA512

    08b7b061b32de65126bd22c8e04a917332c78e8fb77b660e35ebccf5cdfd5fbd07fb7f76efbb221da0f2cdc5a279aac6a26e8c0749b6dd862a9791da1b7274cb

  • SSDEEP

    98304:eRm1FI4Ofs4hghp/MO0myowzLWwPA6QaCj20M9u8R69Afm/Q:km0lfCbR/wzqGAbaCjcQC

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46.exe
    "C:\Users\Admin\AppData\Local\Temp\e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4916
    • C:\Users\Admin\AppData\Local\Temp\e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46.exe
      "C:\Users\Admin\AppData\Local\Temp\e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:224
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4292
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:2832
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4596
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4736
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3772
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1096
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:220
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:1320
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3860
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:672
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4956
          • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
            4⤵
              PID:4920
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Modifies data under HKEY_USERS
        PID:4292

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eszpxgbh.ln4.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        3d086a433708053f9bf9523e1d87a4e8

        SHA1

        b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

        SHA256

        6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

        SHA512

        931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        7071fd28c75b53cfc3cf1996cbc020e5

        SHA1

        5375e175a195cd6d3580510a4371127cd586214c

        SHA256

        1be62bb2d91d4ff5ba3e81fc048e90f4b90f9d57af31c19750c0fad28eea3af4

        SHA512

        80d23117fca750fcda74f2954e7ce8f4b6cd68eed3d868515ee8fb3ff40cceea22953bf1f7df38698e97610952b7fa6ede1cf67d9f8d28984ddb055ff8c7fba3

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        0b8e71a41b252ae92c0d52754652f034

        SHA1

        ff2f057447b2645cee47799d6c3d800453240a52

        SHA256

        9e7e099ed3967b2c7acaca7efe3e94ad7356cd89abedab29c8342dfcba332539

        SHA512

        64129a60e3e8614faa275dce2c0ec7b1706d83461827ef0c783b9c00126cff3cc827d6681ea5e1ac019b446dad0d7d062b1f3c401f31eedb348decb026325c44

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        5f61812f0b2870d2b4325e411b18f0fe

        SHA1

        f8b10fcd91434c40942036539dab29ffc8699598

        SHA256

        bac0b77b32833d0c7ab598f510a593b82f016cdaf67e4858f9ee243af1a4a7e9

        SHA512

        82da04b50dc02ef683ad3118f8c1c2f8f6206a6061f40d0290d8efc0412cc44ec7065377eab167caa04d405d959fa74f773f6719250adb8608d5d5d2f32f24d1

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        80b326d6129e9a86fec4878354c0da69

        SHA1

        51350795ae2fea4e57243d6a72b990ba025c564a

        SHA256

        18ee9f79551dd38a03782c7569999c7e8a8db5d3c208c5be6fa46999149db8b3

        SHA512

        1c827bf684683da542bc833929a41e96b1b5b78877ef3d905d5cb734044357749631ecba1b4b95c487af892761cf21c1fa4132dd16cd0d148d46752c55acb98e

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        b516c801be8f5cff2f89848c19e7ff46

        SHA1

        39652f4cb22704a207c5f946c03ca9423c774f63

        SHA256

        ab57b6aa61512554c88470f8ea96d31a305bd0605de17b7c0b89e5516040d4ae

        SHA512

        0f63144de74a7c2e7feabba1dbead46ffc72bf039ba0fa3e1924645f5ce3347d5320151276e8a43d515b1539ba23187c7058e955c2f39576192cdfc699b67286

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        11ab111ec46b24ac0e8822e3f1a88ffe

        SHA1

        80ae5ba81f6edab19dd3eefdab3de31ffd252ba0

        SHA256

        e58a15345e96ddefc00b5e356a26743d9cda21b64b42f305e0b46d0db9cf6c46

        SHA512

        08b7b061b32de65126bd22c8e04a917332c78e8fb77b660e35ebccf5cdfd5fbd07fb7f76efbb221da0f2cdc5a279aac6a26e8c0749b6dd862a9791da1b7274cb

      • memory/428-203-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/428-193-0x0000000070A40000-0x0000000070D94000-memory.dmp

        Filesize

        3.3MB

      • memory/428-192-0x00000000708C0000-0x000000007090C000-memory.dmp

        Filesize

        304KB

      • memory/428-182-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/428-181-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/428-204-0x000000007FD40000-0x000000007FD50000-memory.dmp

        Filesize

        64KB

      • memory/1096-338-0x00000000708C0000-0x0000000070C14000-memory.dmp

        Filesize

        3.3MB

      • memory/1096-348-0x000000007F340000-0x000000007F350000-memory.dmp

        Filesize

        64KB

      • memory/1096-333-0x0000000005280000-0x0000000005290000-memory.dmp

        Filesize

        64KB

      • memory/1096-334-0x0000000005280000-0x0000000005290000-memory.dmp

        Filesize

        64KB

      • memory/1096-337-0x0000000070740000-0x000000007078C000-memory.dmp

        Filesize

        304KB

      • memory/1096-336-0x0000000005280000-0x0000000005290000-memory.dmp

        Filesize

        64KB

      • memory/1164-258-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/1164-259-0x000000007F340000-0x000000007F350000-memory.dmp

        Filesize

        64KB

      • memory/1164-248-0x0000000070A40000-0x0000000070D94000-memory.dmp

        Filesize

        3.3MB

      • memory/1164-247-0x00000000708C0000-0x000000007090C000-memory.dmp

        Filesize

        304KB

      • memory/1164-245-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/1164-246-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/1516-276-0x0000000002A10000-0x0000000002A20000-memory.dmp

        Filesize

        64KB

      • memory/1516-280-0x000000007F5F0000-0x000000007F600000-memory.dmp

        Filesize

        64KB

      • memory/1516-278-0x0000000002A10000-0x0000000002A20000-memory.dmp

        Filesize

        64KB

      • memory/1516-279-0x00000000709A0000-0x0000000070CF4000-memory.dmp

        Filesize

        3.3MB

      • memory/1516-275-0x0000000002A10000-0x0000000002A20000-memory.dmp

        Filesize

        64KB

      • memory/1516-277-0x0000000070820000-0x000000007086C000-memory.dmp

        Filesize

        304KB

      • memory/2832-316-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-394-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-501-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-484-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-469-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-454-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-439-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-424-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-409-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-321-0x00000000751C0000-0x00000000751D0000-memory.dmp

        Filesize

        64KB

      • memory/2832-379-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-365-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2832-350-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/3772-300-0x00000000050F0000-0x0000000005100000-memory.dmp

        Filesize

        64KB

      • memory/3772-305-0x00000000050F0000-0x0000000005100000-memory.dmp

        Filesize

        64KB

      • memory/3772-306-0x000000007F960000-0x000000007F970000-memory.dmp

        Filesize

        64KB

      • memory/3772-304-0x00000000708C0000-0x0000000070C14000-memory.dmp

        Filesize

        3.3MB

      • memory/3772-303-0x0000000070740000-0x000000007078C000-memory.dmp

        Filesize

        304KB

      • memory/3772-301-0x00000000050F0000-0x0000000005100000-memory.dmp

        Filesize

        64KB

      • memory/3860-363-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4292-232-0x000000007FD60000-0x000000007FD70000-memory.dmp

        Filesize

        64KB

      • memory/4292-228-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/4292-218-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/4292-219-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/4292-220-0x00000000708C0000-0x000000007090C000-memory.dmp

        Filesize

        304KB

      • memory/4292-221-0x0000000071060000-0x00000000713B4000-memory.dmp

        Filesize

        3.3MB

      • memory/4292-500-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4292-364-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4292-408-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4612-233-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4612-264-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4852-173-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4852-179-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4852-134-0x0000000002F80000-0x000000000386B000-memory.dmp

        Filesize

        8.9MB

      • memory/4916-159-0x00000000707C0000-0x000000007080C000-memory.dmp

        Filesize

        304KB

      • memory/4916-174-0x0000000007330000-0x000000000733E000-memory.dmp

        Filesize

        56KB

      • memory/4916-140-0x0000000005380000-0x00000000053E6000-memory.dmp

        Filesize

        408KB

      • memory/4916-139-0x0000000004C50000-0x0000000004C72000-memory.dmp

        Filesize

        136KB

      • memory/4916-138-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/4916-137-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/4916-136-0x0000000004CE0000-0x0000000005308000-memory.dmp

        Filesize

        6.2MB

      • memory/4916-135-0x0000000004670000-0x00000000046A6000-memory.dmp

        Filesize

        216KB

      • memory/4916-172-0x00000000073D0000-0x0000000007466000-memory.dmp

        Filesize

        600KB

      • memory/4916-171-0x00000000072B0000-0x00000000072BA000-memory.dmp

        Filesize

        40KB

      • memory/4916-170-0x0000000007160000-0x000000000717E000-memory.dmp

        Filesize

        120KB

      • memory/4916-141-0x00000000055E0000-0x0000000005646000-memory.dmp

        Filesize

        408KB

      • memory/4916-175-0x0000000007380000-0x000000000739A000-memory.dmp

        Filesize

        104KB

      • memory/4916-160-0x0000000070940000-0x0000000070C94000-memory.dmp

        Filesize

        3.3MB

      • memory/4916-157-0x000000007F260000-0x000000007F270000-memory.dmp

        Filesize

        64KB

      • memory/4916-151-0x0000000005C20000-0x0000000005C3E000-memory.dmp

        Filesize

        120KB

      • memory/4916-158-0x0000000007180000-0x00000000071B2000-memory.dmp

        Filesize

        200KB

      • memory/4916-152-0x0000000006180000-0x00000000061C4000-memory.dmp

        Filesize

        272KB

      • memory/4916-153-0x0000000006F40000-0x0000000006FB6000-memory.dmp

        Filesize

        472KB

      • memory/4916-154-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/4916-156-0x0000000006FE0000-0x0000000006FFA000-memory.dmp

        Filesize

        104KB

      • memory/4916-176-0x0000000007370000-0x0000000007378000-memory.dmp

        Filesize

        32KB

      • memory/4916-155-0x0000000007640000-0x0000000007CBA000-memory.dmp

        Filesize

        6.5MB

      • memory/4920-499-0x0000000000400000-0x0000000000C25000-memory.dmp

        Filesize

        8.1MB