Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 12:41

General

  • Target

    d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498.exe

  • Size

    4.2MB

  • MD5

    0a951d37fb2c56a609059c96c4e1f058

  • SHA1

    f7ecacabd84eb5651d8710bf4d8f2d21eca6d49c

  • SHA256

    d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498

  • SHA512

    20f9805d5c7dd38a83fc8ae347da3237140278406d56180733d0bd3ef73d3eec822e89afe610bb84018f1a189781e69956a3a3bcdc2c6adf7ea64fdb90bea35a

  • SSDEEP

    98304:14Oukmwozu5N1sjvc6C5HzAFpDV4v2Gff887WFFSEVpe1l6UqT5uNF:Mxw0u5Xsj06C5HzAFtV4vjftWfSDTd4U

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498.exe
    "C:\Users\Admin\AppData\Local\Temp\d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4124
    • C:\Users\Admin\AppData\Local\Temp\d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498.exe
      "C:\Users\Admin\AppData\Local\Temp\d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3800
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:812
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:408
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1404
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:316
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4192
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4832
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3012
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1820
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4084
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2676

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vi31pett.wvy.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      a7aa01fc92dffa6bc6c64db1a727541e

      SHA1

      8bab1470a220dd9c507115550da03fc2d50b8b38

      SHA256

      54ceebbd575c8f659736a02fe70d4484ed80990063496eef7a0fce91df98cc2d

      SHA512

      dadb9f078677f1a289f3d62d17d338298d7ff4d318cbbc52a09cdd4c2796c8bd4fe76e615d75f872951398b985f4174a53239b68cdabf7bc55038f3e5e7a3349

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      f595bc1cdfd6015d7fd57037f3c5ff86

      SHA1

      4af4087b7aafaf2be0903660e3fdda5dbd9abcb3

      SHA256

      f2d2b329131a90ffd3ae2d309d2590b37584685ecf0759375d80f907d895bc63

      SHA512

      e83f10477ec04c4d99ccea33e2b7542374e8535a69c194aa94690a4cd9388a613dec0035ada604268a0715b82bc4a2874a89f3186dbb8a0973a12b58b15c5ec8

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      b23dbc7a388481e8683ec9a8bccbcb4e

      SHA1

      0d14ffadabd35fd78c1f1452ef43cab6ad0da106

      SHA256

      6dd19958d314b59e9d4b476c72df88df01e45ea0eaf788152b12109a386a0f0f

      SHA512

      e417475c08b9b783c3fe99edcce217646ab22a40b39043c075f90e9bb3ae7871b04c14852b19c09008b661be849bd031fe0f4333c46d8486773a30815867f9d2

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      bdadf42fa612d6fd6a5f33d39a0dcab9

      SHA1

      1481b1205be06bd841d5e6b32763764affd0554d

      SHA256

      13886ec087b04007590d6a639c7985be072a4d287a466d215d0c9da1f13d485f

      SHA512

      5fc6d2078eb9744e2e75039acfedd04a4935ac3fe6ac2bb96d73825ffe7b9e62aafcad80a8f6535f9ecc6a20cd443a9e46d01f6d15d17d17deea3d13f826a114

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      088fb000d6597ab2668ecfcdc45689c7

      SHA1

      251b9d4dc82405bbd5c8216fd2e51883dfb005e2

      SHA256

      de51e01582cccfbd956dbe458dd20362d8cad900653083ef42d57d62c02df171

      SHA512

      682e5c0f558fd67868b78391a4c135c0680b9cffe35c9404e731c9ded174b29a14ad1c604498c995212441e68305b0007b79386d220acd25647cd67d32690313

    • C:\Windows\rss\csrss.exe
      Filesize

      4.2MB

      MD5

      0a951d37fb2c56a609059c96c4e1f058

      SHA1

      f7ecacabd84eb5651d8710bf4d8f2d21eca6d49c

      SHA256

      d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498

      SHA512

      20f9805d5c7dd38a83fc8ae347da3237140278406d56180733d0bd3ef73d3eec822e89afe610bb84018f1a189781e69956a3a3bcdc2c6adf7ea64fdb90bea35a

    • C:\Windows\rss\csrss.exe
      Filesize

      4.2MB

      MD5

      0a951d37fb2c56a609059c96c4e1f058

      SHA1

      f7ecacabd84eb5651d8710bf4d8f2d21eca6d49c

      SHA256

      d20831daf82bf9482b5cf19bded4d00e68594a5ad1475b61a4bc73c1e837d498

      SHA512

      20f9805d5c7dd38a83fc8ae347da3237140278406d56180733d0bd3ef73d3eec822e89afe610bb84018f1a189781e69956a3a3bcdc2c6adf7ea64fdb90bea35a

    • memory/316-268-0x0000000003200000-0x0000000003210000-memory.dmp
      Filesize

      64KB

    • memory/316-292-0x000000007FCE0000-0x000000007FCF0000-memory.dmp
      Filesize

      64KB

    • memory/316-291-0x0000000003200000-0x0000000003210000-memory.dmp
      Filesize

      64KB

    • memory/316-281-0x0000000070DA0000-0x00000000710F4000-memory.dmp
      Filesize

      3.3MB

    • memory/316-280-0x0000000070C20000-0x0000000070C6C000-memory.dmp
      Filesize

      304KB

    • memory/316-279-0x0000000003200000-0x0000000003210000-memory.dmp
      Filesize

      64KB

    • memory/408-233-0x000000007FD70000-0x000000007FD80000-memory.dmp
      Filesize

      64KB

    • memory/408-232-0x0000000002AB0000-0x0000000002AC0000-memory.dmp
      Filesize

      64KB

    • memory/408-210-0x0000000002AB0000-0x0000000002AC0000-memory.dmp
      Filesize

      64KB

    • memory/408-221-0x0000000070C20000-0x0000000070C6C000-memory.dmp
      Filesize

      304KB

    • memory/408-222-0x0000000070DA0000-0x00000000710F4000-memory.dmp
      Filesize

      3.3MB

    • memory/1404-259-0x00000000050C0000-0x00000000050D0000-memory.dmp
      Filesize

      64KB

    • memory/1404-249-0x0000000070DA0000-0x00000000710F4000-memory.dmp
      Filesize

      3.3MB

    • memory/1404-248-0x0000000070C20000-0x0000000070C6C000-memory.dmp
      Filesize

      304KB

    • memory/1404-246-0x00000000050C0000-0x00000000050D0000-memory.dmp
      Filesize

      64KB

    • memory/1404-247-0x00000000050C0000-0x00000000050D0000-memory.dmp
      Filesize

      64KB

    • memory/1404-260-0x000000007F260000-0x000000007F270000-memory.dmp
      Filesize

      64KB

    • memory/1820-335-0x0000000070CC0000-0x0000000071014000-memory.dmp
      Filesize

      3.3MB

    • memory/1820-334-0x0000000070B40000-0x0000000070B8C000-memory.dmp
      Filesize

      304KB

    • memory/1820-323-0x0000000002BE0000-0x0000000002BF0000-memory.dmp
      Filesize

      64KB

    • memory/1820-345-0x0000000002BE0000-0x0000000002BF0000-memory.dmp
      Filesize

      64KB

    • memory/1820-346-0x000000007FB80000-0x000000007FB90000-memory.dmp
      Filesize

      64KB

    • memory/2140-267-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/2140-209-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/3012-308-0x00000000045C0000-0x00000000045D0000-memory.dmp
      Filesize

      64KB

    • memory/3012-304-0x00000000045C0000-0x00000000045D0000-memory.dmp
      Filesize

      64KB

    • memory/3012-311-0x000000007FC60000-0x000000007FC70000-memory.dmp
      Filesize

      64KB

    • memory/3012-309-0x0000000070CE0000-0x0000000071034000-memory.dmp
      Filesize

      3.3MB

    • memory/3012-307-0x0000000070B40000-0x0000000070B8C000-memory.dmp
      Filesize

      304KB

    • memory/3012-305-0x00000000045C0000-0x00000000045D0000-memory.dmp
      Filesize

      64KB

    • memory/4124-172-0x00000000075E0000-0x00000000075EA000-memory.dmp
      Filesize

      40KB

    • memory/4124-176-0x0000000007680000-0x0000000007688000-memory.dmp
      Filesize

      32KB

    • memory/4124-177-0x00000000026D0000-0x00000000026E0000-memory.dmp
      Filesize

      64KB

    • memory/4124-135-0x00000000025F0000-0x0000000002626000-memory.dmp
      Filesize

      216KB

    • memory/4124-175-0x0000000007690000-0x00000000076AA000-memory.dmp
      Filesize

      104KB

    • memory/4124-174-0x0000000007630000-0x000000000763E000-memory.dmp
      Filesize

      56KB

    • memory/4124-173-0x00000000076F0000-0x0000000007786000-memory.dmp
      Filesize

      600KB

    • memory/4124-136-0x00000000026D0000-0x00000000026E0000-memory.dmp
      Filesize

      64KB

    • memory/4124-171-0x0000000004CD0000-0x0000000004CEE000-memory.dmp
      Filesize

      120KB

    • memory/4124-161-0x0000000070DC0000-0x0000000071114000-memory.dmp
      Filesize

      3.3MB

    • memory/4124-152-0x00000000064D0000-0x0000000006514000-memory.dmp
      Filesize

      272KB

    • memory/4124-159-0x0000000070C20000-0x0000000070C6C000-memory.dmp
      Filesize

      304KB

    • memory/4124-137-0x0000000005080000-0x00000000056A8000-memory.dmp
      Filesize

      6.2MB

    • memory/4124-138-0x00000000026D0000-0x00000000026E0000-memory.dmp
      Filesize

      64KB

    • memory/4124-156-0x00000000072E0000-0x00000000072FA000-memory.dmp
      Filesize

      104KB

    • memory/4124-155-0x0000000007930000-0x0000000007FAA000-memory.dmp
      Filesize

      6.5MB

    • memory/4124-154-0x00000000026D0000-0x00000000026E0000-memory.dmp
      Filesize

      64KB

    • memory/4124-153-0x00000000071C0000-0x0000000007236000-memory.dmp
      Filesize

      472KB

    • memory/4124-139-0x0000000005050000-0x0000000005072000-memory.dmp
      Filesize

      136KB

    • memory/4124-140-0x0000000005720000-0x0000000005786000-memory.dmp
      Filesize

      408KB

    • memory/4124-160-0x000000007FCC0000-0x000000007FCD0000-memory.dmp
      Filesize

      64KB

    • memory/4124-141-0x0000000005800000-0x0000000005866000-memory.dmp
      Filesize

      408KB

    • memory/4124-158-0x00000000074B0000-0x00000000074E2000-memory.dmp
      Filesize

      200KB

    • memory/4124-151-0x0000000005F20000-0x0000000005F3E000-memory.dmp
      Filesize

      120KB

    • memory/4656-191-0x0000000004550000-0x0000000004560000-memory.dmp
      Filesize

      64KB

    • memory/4656-193-0x0000000004550000-0x0000000004560000-memory.dmp
      Filesize

      64KB

    • memory/4656-205-0x000000007FC20000-0x000000007FC30000-memory.dmp
      Filesize

      64KB

    • memory/4656-194-0x0000000070C20000-0x0000000070C6C000-memory.dmp
      Filesize

      304KB

    • memory/4656-190-0x0000000004550000-0x0000000004560000-memory.dmp
      Filesize

      64KB

    • memory/4656-195-0x0000000070DA0000-0x00000000710F4000-memory.dmp
      Filesize

      3.3MB

    • memory/4712-192-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4712-157-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4712-134-0x0000000005160000-0x0000000005A4B000-memory.dmp
      Filesize

      8.9MB

    • memory/4996-375-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-381-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-354-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-360-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-363-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-366-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-369-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-372-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-320-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-378-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB

    • memory/4996-357-0x0000000000400000-0x00000000030DE000-memory.dmp
      Filesize

      44.9MB