Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 15:42

General

  • Target

    9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c.exe

  • Size

    4.2MB

  • MD5

    248d0641bfacce15ba0382067ca2bc7f

  • SHA1

    7acea0134da299a42b5922d79ee1cfcb71818caf

  • SHA256

    9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c

  • SHA512

    4db4b465fe19dc81c4774a22a4ec458e156cee25542e19360cd16d4e247ca6110ec4b1e9ba3bf36b564cff5f0e8d6aa2dc35c386e0b21aa923b814c5bf947513

  • SSDEEP

    98304:kD6BJq3x/k9BOyFc5DGITwYQhAAFeX50i+XvH1mMBgMW/g:5isB3chGrWAkX50iivVmbMkg

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 16 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c.exe
    "C:\Users\Admin\AppData\Local\Temp\9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4880
    • C:\Users\Admin\AppData\Local\Temp\9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c.exe
      "C:\Users\Admin\AppData\Local\Temp\9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3868
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3804
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1120
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2416
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2628
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4256
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2396
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2132

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_we3pixy0.yga.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      0409e030b74d8fdc02e0fe6039ba07bd

      SHA1

      9f64a693a8a0b4f507d1153a2394cf54b73d0076

      SHA256

      949d82579af310f3c33210d8529cbf5b452f28b25bb03acb2e378eada3dc14ad

      SHA512

      cdbf8e679bcd5c6fac5ae069c77d010d21dad17b55f1bbbd25f0b92528a3b15805dc84edacc707dbc323920911996b0697be19526c72ba423378aa200fdb89bf

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      f5309784ff7c9505e56fd1450657a9b2

      SHA1

      d77b511949821e4c878513e98cf4bc69a963ee2c

      SHA256

      42039951b9419f1f6527597dcaf21bcd7f5747b0099805e3f599a647cf38feb2

      SHA512

      69b78c9298d48c7768e4c746b459589c5e9e6ee83b6719f5ce87714245dbd21bcd6868b28c5cef257700e48360096f9b31cd2d7a57c3b66993495568b7fc40e4

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      010e1b7d0592400c95a7a57367d10411

      SHA1

      1a0118a70c5a931c078734df1d1dc74d417930c1

      SHA256

      5e26fadfa5ecfd049f4644825903888e343d1d7f9159a954633e6a6f7a2ff319

      SHA512

      71551af13b4e0932d370e7768a857bc36dc915f32274dab2fb7f00104d2a2f74c1214dd00b601f67a421a90aa128dd58f5c9c219e57cb5654fed74dbf07db3e4

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      e26251c86b513b7e9299f5525082aec6

      SHA1

      8abe25bb2375822b66bf5b3c156a7e7f440f3c99

      SHA256

      28f84cabcd6f424bf4358bc15496cd2e20c2f5a245dbb6a6ec3c091e755fded0

      SHA512

      ea2fe7e84d54a138c0eb0e073dfba405ff60cb7ebe77fc71d71d26bfddf582c14853777920c1c5270bb0d73aca77743025f3f555525a1e49bbc09db81043bcc0

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      52bbb2d677dae2d1b74e8ca4e1c11a15

      SHA1

      e9a596c48df3bf1ecd9605915c02cdaa26a276fd

      SHA256

      0445c95055dfafe2134d3da260d78307c4e502f45029cfe80d5794978702a914

      SHA512

      f83cb5c31d767bc0c591da5741b1d5adda9ff33ddcedb1bf888a8c6a029d3b3a180eb228642a5202ee2e18dd8163b2bbdb3fead5834e3d8f2be86df88cf2931a

    • C:\Windows\rss\csrss.exe
      Filesize

      4.2MB

      MD5

      248d0641bfacce15ba0382067ca2bc7f

      SHA1

      7acea0134da299a42b5922d79ee1cfcb71818caf

      SHA256

      9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c

      SHA512

      4db4b465fe19dc81c4774a22a4ec458e156cee25542e19360cd16d4e247ca6110ec4b1e9ba3bf36b564cff5f0e8d6aa2dc35c386e0b21aa923b814c5bf947513

    • C:\Windows\rss\csrss.exe
      Filesize

      4.2MB

      MD5

      248d0641bfacce15ba0382067ca2bc7f

      SHA1

      7acea0134da299a42b5922d79ee1cfcb71818caf

      SHA256

      9d8e305e64525eca900f7bac0d2f1616e2b0f8da0e0136d0524b7676b11b754c

      SHA512

      4db4b465fe19dc81c4774a22a4ec458e156cee25542e19360cd16d4e247ca6110ec4b1e9ba3bf36b564cff5f0e8d6aa2dc35c386e0b21aa923b814c5bf947513

    • memory/220-361-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-351-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-353-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-355-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-357-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-305-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-359-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-363-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-365-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-367-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/220-369-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/2628-294-0x0000000004970000-0x0000000004980000-memory.dmp
      Filesize

      64KB

    • memory/2628-317-0x0000000004970000-0x0000000004980000-memory.dmp
      Filesize

      64KB

    • memory/2628-307-0x00000000708C0000-0x0000000070C14000-memory.dmp
      Filesize

      3.3MB

    • memory/2628-293-0x0000000004970000-0x0000000004980000-memory.dmp
      Filesize

      64KB

    • memory/2628-306-0x0000000070120000-0x000000007016C000-memory.dmp
      Filesize

      304KB

    • memory/3604-231-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/3604-266-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/3804-277-0x00000000014B0000-0x00000000014C0000-memory.dmp
      Filesize

      64KB

    • memory/3804-280-0x0000000070200000-0x000000007024C000-memory.dmp
      Filesize

      304KB

    • memory/3804-279-0x00000000014B0000-0x00000000014C0000-memory.dmp
      Filesize

      64KB

    • memory/3804-291-0x000000007EEB0000-0x000000007EEC0000-memory.dmp
      Filesize

      64KB

    • memory/3804-281-0x00000000709A0000-0x0000000070CF4000-memory.dmp
      Filesize

      3.3MB

    • memory/3804-276-0x00000000014B0000-0x00000000014C0000-memory.dmp
      Filesize

      64KB

    • memory/3868-190-0x00000000053B0000-0x00000000053C0000-memory.dmp
      Filesize

      64KB

    • memory/3868-204-0x000000007F7E0000-0x000000007F7F0000-memory.dmp
      Filesize

      64KB

    • memory/3868-203-0x00000000053B0000-0x00000000053C0000-memory.dmp
      Filesize

      64KB

    • memory/3868-193-0x0000000070A40000-0x0000000070D94000-memory.dmp
      Filesize

      3.3MB

    • memory/3868-192-0x00000000702A0000-0x00000000702EC000-memory.dmp
      Filesize

      304KB

    • memory/3868-191-0x00000000053B0000-0x00000000053C0000-memory.dmp
      Filesize

      64KB

    • memory/4236-233-0x000000007F0E0000-0x000000007F0F0000-memory.dmp
      Filesize

      64KB

    • memory/4236-232-0x0000000000E30000-0x0000000000E40000-memory.dmp
      Filesize

      64KB

    • memory/4236-218-0x0000000000E30000-0x0000000000E40000-memory.dmp
      Filesize

      64KB

    • memory/4236-219-0x0000000000E30000-0x0000000000E40000-memory.dmp
      Filesize

      64KB

    • memory/4236-220-0x00000000702A0000-0x00000000702EC000-memory.dmp
      Filesize

      304KB

    • memory/4236-221-0x00000000706C0000-0x0000000070A14000-memory.dmp
      Filesize

      3.3MB

    • memory/4256-344-0x000000007F210000-0x000000007F220000-memory.dmp
      Filesize

      64KB

    • memory/4256-343-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/4256-330-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/4256-331-0x0000000004E70000-0x0000000004E80000-memory.dmp
      Filesize

      64KB

    • memory/4256-332-0x0000000070120000-0x000000007016C000-memory.dmp
      Filesize

      304KB

    • memory/4256-333-0x00000000702E0000-0x0000000070634000-memory.dmp
      Filesize

      3.3MB

    • memory/4344-247-0x00000000702A0000-0x00000000702EC000-memory.dmp
      Filesize

      304KB

    • memory/4344-246-0x0000000005020000-0x0000000005030000-memory.dmp
      Filesize

      64KB

    • memory/4344-245-0x0000000005020000-0x0000000005030000-memory.dmp
      Filesize

      64KB

    • memory/4344-259-0x000000007FD30000-0x000000007FD40000-memory.dmp
      Filesize

      64KB

    • memory/4344-248-0x0000000070A40000-0x0000000070D94000-memory.dmp
      Filesize

      3.3MB

    • memory/4344-258-0x0000000005020000-0x0000000005030000-memory.dmp
      Filesize

      64KB

    • memory/4644-179-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/4644-134-0x0000000005230000-0x0000000005B1B000-memory.dmp
      Filesize

      8.9MB

    • memory/4644-173-0x0000000000400000-0x00000000030D4000-memory.dmp
      Filesize

      44.8MB

    • memory/4880-156-0x00000000074F0000-0x000000000750A000-memory.dmp
      Filesize

      104KB

    • memory/4880-154-0x0000000007B50000-0x00000000081CA000-memory.dmp
      Filesize

      6.5MB

    • memory/4880-158-0x00000000701A0000-0x00000000701EC000-memory.dmp
      Filesize

      304KB

    • memory/4880-157-0x00000000076A0000-0x00000000076D2000-memory.dmp
      Filesize

      200KB

    • memory/4880-160-0x0000000070750000-0x0000000070AA4000-memory.dmp
      Filesize

      3.3MB

    • memory/4880-170-0x0000000007680000-0x000000000769E000-memory.dmp
      Filesize

      120KB

    • memory/4880-171-0x00000000077D0000-0x00000000077DA000-memory.dmp
      Filesize

      40KB

    • memory/4880-172-0x00000000078E0000-0x0000000007976000-memory.dmp
      Filesize

      600KB

    • memory/4880-174-0x0000000007820000-0x000000000782E000-memory.dmp
      Filesize

      56KB

    • memory/4880-175-0x0000000007880000-0x000000000789A000-memory.dmp
      Filesize

      104KB

    • memory/4880-176-0x0000000007870000-0x0000000007878000-memory.dmp
      Filesize

      32KB

    • memory/4880-159-0x000000007F9A0000-0x000000007F9B0000-memory.dmp
      Filesize

      64KB

    • memory/4880-155-0x0000000004D60000-0x0000000004D70000-memory.dmp
      Filesize

      64KB

    • memory/4880-153-0x0000000007450000-0x00000000074C6000-memory.dmp
      Filesize

      472KB

    • memory/4880-152-0x00000000065F0000-0x0000000006634000-memory.dmp
      Filesize

      272KB

    • memory/4880-151-0x0000000006130000-0x000000000614E000-memory.dmp
      Filesize

      120KB

    • memory/4880-141-0x0000000005B00000-0x0000000005B66000-memory.dmp
      Filesize

      408KB

    • memory/4880-140-0x0000000005300000-0x0000000005366000-memory.dmp
      Filesize

      408KB

    • memory/4880-139-0x0000000005260000-0x0000000005282000-memory.dmp
      Filesize

      136KB

    • memory/4880-138-0x0000000004D60000-0x0000000004D70000-memory.dmp
      Filesize

      64KB

    • memory/4880-137-0x0000000004D60000-0x0000000004D70000-memory.dmp
      Filesize

      64KB

    • memory/4880-136-0x00000000053A0000-0x00000000059C8000-memory.dmp
      Filesize

      6.2MB

    • memory/4880-135-0x0000000002B30000-0x0000000002B66000-memory.dmp
      Filesize

      216KB