Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-06-2023 23:34

General

  • Target

    350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc.exe

  • Size

    4.1MB

  • MD5

    74766a254973edc13d42e2d071b23dbb

  • SHA1

    57de2beae0dce1e7e9d0d5415040aa1bc040d641

  • SHA256

    350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc

  • SHA512

    f3e28f4b0632dc7e07b17c75e305e6a78985b2c96481b3d334fcd4aec08d715eaf792c109e860417e6f31f40c8c65b67913929876f3dce65d87c0350bc6b35dd

  • SSDEEP

    98304:nBN1RAFSgRiVCpISJpdcmes/cLo8j85qRy/lobOo38ds:NWKCpI4pdFo5Hy/loNs6

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 16 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc.exe
    "C:\Users\Admin\AppData\Local\Temp\350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3712
    • C:\Users\Admin\AppData\Local\Temp\350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc.exe
      "C:\Users\Admin\AppData\Local\Temp\350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc.exe"
      2⤵
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
      • C:\Windows\System32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4284
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4352
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:844
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:884
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2644
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3572
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:808

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Disabling Security Tools

    2
    T1089

    Modify Registry

    3
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sllntmfv.mhs.ps1
      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      18KB

      MD5

      00cd9623c87c936224526199a0e044f1

      SHA1

      5abbcf46e05780150f270f5a94b6cafdd086b8b6

      SHA256

      84cae5798af3470f2b3acb716653c79a579f45800fc92a516d505dc3580163f4

      SHA512

      72cac70cfc9c825f4dd2d8506c9e8698960c09e915f0f22f6b6f60844dcc0a86e1ce33dd6ee616dcbf1f4f90ba63e42ac36cc6279455e15773753171bfe1ccdb

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      18KB

      MD5

      5b2fe85a03f4851037df5e7f6bdda9c2

      SHA1

      36d6a41f718959c4c5b1000150b77e4d2dd90208

      SHA256

      d90897f8ef701cf7110f08fce116ce10e28aa313234856b7c8937c37230ef872

      SHA512

      5c1613f8520edf48592f5dfee58fc3ced543645a041675e07b1e21664ff3a62dfcf24ceaf4778db5550b2070255a5e7d412fd3b4cf85e2b64686060e7312167c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      18KB

      MD5

      7f792302184f9d3eaadb3eedf97ce85b

      SHA1

      145997ce661a329d3317a32afac158131e57fa09

      SHA256

      6358c4a7d971b7bc1f22ca9b7b40ea5d830741e40967c67626399c846ae84422

      SHA512

      03c18413f0fd1249ec8be4faf0ad3f8cd5a7b1fc44c736b9866fe940726b867bee775854df2168b4d838e69262fd85279b11f02581775ac99a8769a1989d87a2

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      18KB

      MD5

      5a600e2b08b0b74671b60b7c383fb432

      SHA1

      bd400d6c8ff4fcf1e9c969b6c50f74eaa72e1a5a

      SHA256

      40eff8bb2719134265333aee052fd59232d585ee8104ea52148523491bc83d0d

      SHA512

      e66a71547f06f70d6c31abb64d757230ba3ac9bc9baf113d0d2820c1a739f05a7469cc44d0fe4c4cfa500fc94e285d5ae94eee0b44973104bd77a41a3f8eab65

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      18KB

      MD5

      59a7cb80f7249129a6dd0af4bcf61c27

      SHA1

      15f4efe9e68adaad6e3bc3142e338814b5a2614e

      SHA256

      1c46e1bf86d0a593d417c6d99e52cbeb423d22b505e62e6032ad0c1471b5771e

      SHA512

      861e6d6bbab2a397003b514a129191fa45c564336e74f65e8e63f9fe1e97fb2ae05563f00a12e1d00d737d3b6a4a7aa10e5a6cafb8f720e0225c15fe1a5029d9

    • C:\Windows\rss\csrss.exe
      Filesize

      4.1MB

      MD5

      74766a254973edc13d42e2d071b23dbb

      SHA1

      57de2beae0dce1e7e9d0d5415040aa1bc040d641

      SHA256

      350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc

      SHA512

      f3e28f4b0632dc7e07b17c75e305e6a78985b2c96481b3d334fcd4aec08d715eaf792c109e860417e6f31f40c8c65b67913929876f3dce65d87c0350bc6b35dd

    • C:\Windows\rss\csrss.exe
      Filesize

      4.1MB

      MD5

      74766a254973edc13d42e2d071b23dbb

      SHA1

      57de2beae0dce1e7e9d0d5415040aa1bc040d641

      SHA256

      350453288ed6124f323a642da2063f2e78b4ebc3762f6a3d6bf13b049c1a20bc

      SHA512

      f3e28f4b0632dc7e07b17c75e305e6a78985b2c96481b3d334fcd4aec08d715eaf792c109e860417e6f31f40c8c65b67913929876f3dce65d87c0350bc6b35dd

    • memory/884-1432-0x0000000000F10000-0x0000000000F20000-memory.dmp
      Filesize

      64KB

    • memory/884-1405-0x0000000000F10000-0x0000000000F20000-memory.dmp
      Filesize

      64KB

    • memory/884-1404-0x0000000000F10000-0x0000000000F20000-memory.dmp
      Filesize

      64KB

    • memory/884-1431-0x000000007EC70000-0x000000007EC80000-memory.dmp
      Filesize

      64KB

    • memory/884-1403-0x00000000074A0000-0x00000000077F0000-memory.dmp
      Filesize

      3.3MB

    • memory/884-1407-0x0000000007E10000-0x0000000007E5B000-memory.dmp
      Filesize

      300KB

    • memory/884-1430-0x0000000008E90000-0x0000000008F35000-memory.dmp
      Filesize

      660KB

    • memory/1304-424-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/1304-445-0x000000007EDE0000-0x000000007EDF0000-memory.dmp
      Filesize

      64KB

    • memory/1304-450-0x0000000009C20000-0x0000000009CC5000-memory.dmp
      Filesize

      660KB

    • memory/1304-472-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/1304-426-0x00000000087B0000-0x00000000087FB000-memory.dmp
      Filesize

      300KB

    • memory/1304-423-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/1304-425-0x0000000008160000-0x00000000084B0000-memory.dmp
      Filesize

      3.3MB

    • memory/2060-1246-0x0000000000F50000-0x0000000000F60000-memory.dmp
      Filesize

      64KB

    • memory/2060-1160-0x0000000000F50000-0x0000000000F60000-memory.dmp
      Filesize

      64KB

    • memory/2060-1186-0x0000000009100000-0x00000000091A5000-memory.dmp
      Filesize

      660KB

    • memory/2060-1163-0x0000000007B80000-0x0000000007BCB000-memory.dmp
      Filesize

      300KB

    • memory/2060-1159-0x0000000000F50000-0x0000000000F60000-memory.dmp
      Filesize

      64KB

    • memory/2060-1161-0x00000000077D0000-0x0000000007B20000-memory.dmp
      Filesize

      3.3MB

    • memory/2580-1740-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1893-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1899-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1898-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1897-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1896-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1402-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1892-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1894-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2580-1895-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2644-1742-0x0000000006890000-0x00000000068A0000-memory.dmp
      Filesize

      64KB

    • memory/2644-1648-0x0000000006890000-0x00000000068A0000-memory.dmp
      Filesize

      64KB

    • memory/2644-1649-0x0000000006890000-0x00000000068A0000-memory.dmp
      Filesize

      64KB

    • memory/2644-1741-0x000000007F410000-0x000000007F420000-memory.dmp
      Filesize

      64KB

    • memory/2896-418-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/2896-122-0x0000000004C70000-0x000000000555B000-memory.dmp
      Filesize

      8.9MB

    • memory/2896-194-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/3712-201-0x000000000A2B0000-0x000000000A344000-memory.dmp
      Filesize

      592KB

    • memory/3712-132-0x0000000007E20000-0x0000000008170000-memory.dmp
      Filesize

      3.3MB

    • memory/3712-125-0x0000000006CC0000-0x0000000006CF6000-memory.dmp
      Filesize

      216KB

    • memory/3712-126-0x00000000073F0000-0x0000000007A18000-memory.dmp
      Filesize

      6.2MB

    • memory/3712-127-0x0000000006DB0000-0x0000000006DC0000-memory.dmp
      Filesize

      64KB

    • memory/3712-128-0x0000000006DB0000-0x0000000006DC0000-memory.dmp
      Filesize

      64KB

    • memory/3712-129-0x00000000072C0000-0x00000000072E2000-memory.dmp
      Filesize

      136KB

    • memory/3712-130-0x0000000007A90000-0x0000000007AF6000-memory.dmp
      Filesize

      408KB

    • memory/3712-131-0x0000000007DB0000-0x0000000007E16000-memory.dmp
      Filesize

      408KB

    • memory/3712-133-0x0000000007D90000-0x0000000007DAC000-memory.dmp
      Filesize

      112KB

    • memory/3712-134-0x00000000082C0000-0x000000000830B000-memory.dmp
      Filesize

      300KB

    • memory/3712-153-0x0000000009200000-0x000000000923C000-memory.dmp
      Filesize

      240KB

    • memory/3712-184-0x00000000092C0000-0x0000000009336000-memory.dmp
      Filesize

      472KB

    • memory/3712-400-0x0000000008660000-0x0000000008668000-memory.dmp
      Filesize

      32KB

    • memory/3712-395-0x000000000A290000-0x000000000A2AA000-memory.dmp
      Filesize

      104KB

    • memory/3712-297-0x0000000006DB0000-0x0000000006DC0000-memory.dmp
      Filesize

      64KB

    • memory/3712-200-0x0000000006DB0000-0x0000000006DC0000-memory.dmp
      Filesize

      64KB

    • memory/3712-199-0x000000000A120000-0x000000000A1C5000-memory.dmp
      Filesize

      660KB

    • memory/3712-193-0x000000000A0C0000-0x000000000A0DE000-memory.dmp
      Filesize

      120KB

    • memory/3712-192-0x000000007F2D0000-0x000000007F2E0000-memory.dmp
      Filesize

      64KB

    • memory/3712-191-0x000000000A0E0000-0x000000000A113000-memory.dmp
      Filesize

      204KB

    • memory/3916-671-0x0000000006970000-0x0000000006980000-memory.dmp
      Filesize

      64KB

    • memory/3916-670-0x0000000006970000-0x0000000006980000-memory.dmp
      Filesize

      64KB

    • memory/3916-730-0x0000000006970000-0x0000000006980000-memory.dmp
      Filesize

      64KB

    • memory/3916-728-0x000000007EC90000-0x000000007ECA0000-memory.dmp
      Filesize

      64KB

    • memory/4016-627-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/4016-1154-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/4016-900-0x0000000000400000-0x000000000294C000-memory.dmp
      Filesize

      37.3MB

    • memory/4616-911-0x0000000007C80000-0x0000000007FD0000-memory.dmp
      Filesize

      3.3MB

    • memory/4616-913-0x0000000007010000-0x0000000007020000-memory.dmp
      Filesize

      64KB

    • memory/4616-914-0x0000000007010000-0x0000000007020000-memory.dmp
      Filesize

      64KB

    • memory/4616-937-0x000000007F910000-0x000000007F920000-memory.dmp
      Filesize

      64KB

    • memory/4616-938-0x0000000007010000-0x0000000007020000-memory.dmp
      Filesize

      64KB