Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2023, 08:42

General

  • Target

    02549899.exe

  • Size

    4.2MB

  • MD5

    03a9fc04df102f4f31016ac1585a701b

  • SHA1

    4c7c323954f781b92c5a85106bc08d19e80582b4

  • SHA256

    2d3d1e44aa6af981353e5ffd76a13b103d3d4899af8d6c74657fd691fe6c5730

  • SHA512

    0bf7d9e3def78efcf28ae0f511ebd965082c9616de227a25261d6d3701d2e8698c35fda44f904e02d1f4b6fb8b55495bfabf3570ece42f5f382122082249a83e

  • SSDEEP

    98304:CRgSJaWg2PQMRG98bE9sXZZbJ3PRAA5vxVS8I3b1Ei0c:CRVaZSGEqsXZZbJ35bvxVS8o9r

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02549899.exe
    "C:\Users\Admin\AppData\Local\Temp\02549899.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Users\Admin\AppData\Local\Temp\02549899.exe
      "C:\Users\Admin\AppData\Local\Temp\02549899.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3888
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3236
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3700
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3508
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3572
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3328
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2764
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2160
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4492
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4644
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1124
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3996
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4620

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zxl5tdgd.3o4.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      3d086a433708053f9bf9523e1d87a4e8

      SHA1

      b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

      SHA256

      6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

      SHA512

      931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      0e34658f4e04c4b6e8abaded909105b7

      SHA1

      dad03907b99cbefe61e4c85e24fc1a5ccf10428d

      SHA256

      2736499bd882e81d30df5c12fcf7bb7316d354b4e055a5c2739010cb400c21bf

      SHA512

      810ed012fe8bbf4a8ccaf60d8f7ee6e3596a257203483fe89c8a598927dacbf390b10ad30231ac35b8f7ef9e1079b89d5ab602a3f7787be938bb701b5f1dda25

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      a20efbb9ec2a5ce3c00a9a335afdb984

      SHA1

      1056bd76ead982252ffd7685bad674a773486fe3

      SHA256

      d29f349bf67c0c6f4b56158efdda97f0c65dcdef29a102682a004423fcb3ba6b

      SHA512

      0bc8a6054a8ca52a5b009e4a242388a48b937499d6f6ba19a895fdc8635a4569bc3335eebd3b2906733ce07a52353bb89b77066d1f709210b63fe92dcf52393d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      01c5619683077cfe0471aade319d6a25

      SHA1

      53ecbcb40ad3eb26a5d25e85d61c1c7e955a2a9d

      SHA256

      6fd6d0f9dc76c813bd2b4c0d2bd7e5fbae9887b062223ba0470d48914fa97ef0

      SHA512

      4e275def57bcf1cff908cc305e2b963e4dbef7a61b5fd252084e6b80e4388803acea344e8f15e0bacab457a946f9aaa7e1087985767ddbdd02d232d7b637e7d5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      34dbe5a92902390b32f4edf8cb9d9f3d

      SHA1

      4e718062f3b52dac63e6fbff6be2687c8978e7cc

      SHA256

      2c2ee01178e40d87f3c1f884dedc8e889cb0ec10086e7620d589a2cebe5fe2c9

      SHA512

      c71cf133316d3a93c28e2f7437941638539a45c6f0547f3dab72a1b813cd0ec20ca0579dc3b8b7627561096190ef9e9f13bf56d1b9c906313aaa89d710f68d96

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      e28badde66a7e84325d54a83224daa5c

      SHA1

      eaf89bded9157e41f97345a0aae5c008d57ac7a0

      SHA256

      0a3e36eadb1bb279c6222be0634aa06b3c1ca5dde0c42397fb3ba358b28993e4

      SHA512

      d3840a8584c90738f30484e9303fbab8b2d2513f5ff09fb6c5bdfd2d996aefe49569e6272265782df966c601d7a0f933bab673284e5a1bfc1f6a3219c667285d

    • C:\Windows\rss\csrss.exe

      Filesize

      4.2MB

      MD5

      03a9fc04df102f4f31016ac1585a701b

      SHA1

      4c7c323954f781b92c5a85106bc08d19e80582b4

      SHA256

      2d3d1e44aa6af981353e5ffd76a13b103d3d4899af8d6c74657fd691fe6c5730

      SHA512

      0bf7d9e3def78efcf28ae0f511ebd965082c9616de227a25261d6d3701d2e8698c35fda44f904e02d1f4b6fb8b55495bfabf3570ece42f5f382122082249a83e

    • C:\Windows\rss\csrss.exe

      Filesize

      4.2MB

      MD5

      03a9fc04df102f4f31016ac1585a701b

      SHA1

      4c7c323954f781b92c5a85106bc08d19e80582b4

      SHA256

      2d3d1e44aa6af981353e5ffd76a13b103d3d4899af8d6c74657fd691fe6c5730

      SHA512

      0bf7d9e3def78efcf28ae0f511ebd965082c9616de227a25261d6d3701d2e8698c35fda44f904e02d1f4b6fb8b55495bfabf3570ece42f5f382122082249a83e

    • memory/1124-332-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/1124-318-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/1124-331-0x00000000718D0000-0x0000000071C24000-memory.dmp

      Filesize

      3.3MB

    • memory/1124-333-0x000000007EEF0000-0x000000007EF00000-memory.dmp

      Filesize

      64KB

    • memory/1124-330-0x0000000070CE0000-0x0000000070D2C000-memory.dmp

      Filesize

      304KB

    • memory/1656-259-0x000000007FD30000-0x000000007FD40000-memory.dmp

      Filesize

      64KB

    • memory/1656-249-0x0000000003080000-0x0000000003090000-memory.dmp

      Filesize

      64KB

    • memory/1656-248-0x0000000070F40000-0x0000000071294000-memory.dmp

      Filesize

      3.3MB

    • memory/1656-247-0x0000000070DC0000-0x0000000070E0C000-memory.dmp

      Filesize

      304KB

    • memory/1656-246-0x0000000003080000-0x0000000003090000-memory.dmp

      Filesize

      64KB

    • memory/1656-245-0x0000000003080000-0x0000000003090000-memory.dmp

      Filesize

      64KB

    • memory/1944-173-0x0000000007AE0000-0x0000000007B76000-memory.dmp

      Filesize

      600KB

    • memory/1944-159-0x0000000070F40000-0x0000000071294000-memory.dmp

      Filesize

      3.3MB

    • memory/1944-175-0x0000000007BA0000-0x0000000007BBA000-memory.dmp

      Filesize

      104KB

    • memory/1944-176-0x0000000007B80000-0x0000000007B88000-memory.dmp

      Filesize

      32KB

    • memory/1944-135-0x0000000002D30000-0x0000000002D66000-memory.dmp

      Filesize

      216KB

    • memory/1944-136-0x0000000005560000-0x0000000005B88000-memory.dmp

      Filesize

      6.2MB

    • memory/1944-137-0x0000000002E00000-0x0000000002E10000-memory.dmp

      Filesize

      64KB

    • memory/1944-138-0x0000000002E00000-0x0000000002E10000-memory.dmp

      Filesize

      64KB

    • memory/1944-139-0x0000000005440000-0x0000000005462000-memory.dmp

      Filesize

      136KB

    • memory/1944-140-0x0000000005C40000-0x0000000005CA6000-memory.dmp

      Filesize

      408KB

    • memory/1944-143-0x0000000005CB0000-0x0000000005D16000-memory.dmp

      Filesize

      408KB

    • memory/1944-151-0x0000000006390000-0x00000000063AE000-memory.dmp

      Filesize

      120KB

    • memory/1944-172-0x000000007FD00000-0x000000007FD10000-memory.dmp

      Filesize

      64KB

    • memory/1944-152-0x0000000007510000-0x0000000007554000-memory.dmp

      Filesize

      272KB

    • memory/1944-174-0x0000000007AA0000-0x0000000007AAE000-memory.dmp

      Filesize

      56KB

    • memory/1944-153-0x00000000076B0000-0x0000000007726000-memory.dmp

      Filesize

      472KB

    • memory/1944-154-0x0000000002E00000-0x0000000002E10000-memory.dmp

      Filesize

      64KB

    • memory/1944-155-0x0000000007DB0000-0x000000000842A000-memory.dmp

      Filesize

      6.5MB

    • memory/1944-156-0x0000000007750000-0x000000000776A000-memory.dmp

      Filesize

      104KB

    • memory/1944-157-0x0000000007900000-0x0000000007932000-memory.dmp

      Filesize

      200KB

    • memory/1944-158-0x0000000070DC0000-0x0000000070E0C000-memory.dmp

      Filesize

      304KB

    • memory/1944-170-0x0000000007A30000-0x0000000007A3A000-memory.dmp

      Filesize

      40KB

    • memory/1944-169-0x00000000078E0000-0x00000000078FE000-memory.dmp

      Filesize

      120KB

    • memory/2764-278-0x00000000026D0000-0x00000000026E0000-memory.dmp

      Filesize

      64KB

    • memory/2764-290-0x000000007FCE0000-0x000000007FCF0000-memory.dmp

      Filesize

      64KB

    • memory/2764-267-0x00000000026D0000-0x00000000026E0000-memory.dmp

      Filesize

      64KB

    • memory/2764-280-0x0000000071540000-0x0000000071894000-memory.dmp

      Filesize

      3.3MB

    • memory/2764-279-0x0000000070DC0000-0x0000000070E0C000-memory.dmp

      Filesize

      304KB

    • memory/3236-190-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/3236-189-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/3236-191-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/3236-192-0x0000000070DC0000-0x0000000070E0C000-memory.dmp

      Filesize

      304KB

    • memory/3236-193-0x0000000071560000-0x00000000718B4000-memory.dmp

      Filesize

      3.3MB

    • memory/3236-203-0x000000007F800000-0x000000007F810000-memory.dmp

      Filesize

      64KB

    • memory/3328-351-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-355-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-381-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-379-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-375-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-372-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-369-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-367-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-363-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-360-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-329-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3328-357-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3572-221-0x0000000071560000-0x00000000718B4000-memory.dmp

      Filesize

      3.3MB

    • memory/3572-220-0x0000000070DC0000-0x0000000070E0C000-memory.dmp

      Filesize

      304KB

    • memory/3572-222-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/3572-223-0x000000007F7E0000-0x000000007F7F0000-memory.dmp

      Filesize

      64KB

    • memory/3572-218-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/3572-219-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/3888-233-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/3888-291-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/4624-171-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/4624-206-0x0000000000400000-0x0000000000D1B000-memory.dmp

      Filesize

      9.1MB

    • memory/4624-134-0x0000000002F60000-0x000000000384B000-memory.dmp

      Filesize

      8.9MB

    • memory/4644-315-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4644-316-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4644-305-0x0000000070E80000-0x00000000711D4000-memory.dmp

      Filesize

      3.3MB

    • memory/4644-304-0x0000000070CE0000-0x0000000070D2C000-memory.dmp

      Filesize

      304KB

    • memory/4644-303-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB