Analysis

  • max time kernel
    132s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 13:08

General

  • Target

    643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe

  • Size

    4.1MB

  • MD5

    a6379db5b1abbfe8594cca160feceb45

  • SHA1

    24d379bb6367f0ed2af47cbf0466c87fa5971955

  • SHA256

    643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad

  • SHA512

    68e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082

  • SSDEEP

    98304:vlhp/+MAY8LSBetbsJnYPJay0ram2uVyHV/vsKO4IVa8TY/jpHwrQ:vlT/+M2+BeVsJYPms9vsd3Va8M/jpZ

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 16 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe
    "C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4164
    • C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe
      "C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3372
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1896
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3728
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:768
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5036
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4328
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:760
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:1096
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
                PID:3404
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                4⤵
                  PID:3148
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  4⤵
                  • Creates scheduled task(s)
                  PID:2588

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ptonpuxi.suu.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
            Filesize

            2KB

            MD5

            3d086a433708053f9bf9523e1d87a4e8

            SHA1

            b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

            SHA256

            6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

            SHA512

            931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
            Filesize

            19KB

            MD5

            b8e26f0ff4c06add5421f38dced7f138

            SHA1

            6d32b5ad7a40f27886278cde6f1726c8cce73e33

            SHA256

            8c042e9dd41e1f0c4bf67185e103df8f15f62efa243eed8a36ec883bd6bf0f94

            SHA512

            346c663909bd256c3e8a705e6b2d47795010a21e8fc4da8cc7327d533a4457109e029c35d0fbfb2ecc1f3140e6d9c90379415042244a50a66c16ace656c98d11

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
            Filesize

            19KB

            MD5

            ee1a6745187009e5fc3f7a2f13edb5c3

            SHA1

            a2442c645b99d337074574732e2b2e410ee635c2

            SHA256

            5a443a2024c1ca2159c59e2bf9c544d06015daa1b5ff5e244a94846ae3cad667

            SHA512

            93620f6c95cf2285beb7372c9463eb523a56da76e33317903a10f58f07e1b300d79fd204e219799098b24fd1605dd913a13b7e572a13c88e4bf3654e2d569a7b

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
            Filesize

            19KB

            MD5

            4b9f598afea3c11e25c05a93c40d60b3

            SHA1

            61199d23ecb10c42c26d92cf0aaca60d75fdbeaa

            SHA256

            c43dab770365ff891930f0263b66429a682f6d53844b78dc8d2e8ac688c03fb1

            SHA512

            02b1c39d8514d83eb8d203e7010d85052a0ed405ffd09f00dd22e089dc2bd15c11bb0829fd1306e9c5a3ad16a109b8995fcc052f2df8330b65770dea6ccf87e1

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
            Filesize

            19KB

            MD5

            dbb658bd11df1a801f03147a23cfdb92

            SHA1

            9798dbc93c0eff1d1696fcb3e2865fd8b2a8c9d9

            SHA256

            94deba59133fdd505ea460db07cda830beeefff543ae5c6961247a8f5cd6d154

            SHA512

            a8fec069e5e9549b3aa008ce8cb93caf75cdac7de098590444350bb3e7d824417dcc5a737e47795bee3722f1244f659ef9bb28f118da27593ba8ae0f10422b62

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
            Filesize

            19KB

            MD5

            4637e9f8d54e8e028acf63d7b57bb88a

            SHA1

            d0f20033b42866d86722d9f4c29b71f5727d2584

            SHA256

            cdfd9c2b5a9222ee94684a095ecbb7a666bb6a2ffadf857cfbed6aaff7737ddd

            SHA512

            dd3c7a30c305cea19425e7cdd7f47df3df4dbf94c99495f17efe87b365513bc111f48b88c23166cee43d2c9ea5050a921801a7aa2a23b5b2bc9f02b5be9feba9

          • C:\Windows\rss\csrss.exe
            Filesize

            4.1MB

            MD5

            a6379db5b1abbfe8594cca160feceb45

            SHA1

            24d379bb6367f0ed2af47cbf0466c87fa5971955

            SHA256

            643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad

            SHA512

            68e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082

          • C:\Windows\rss\csrss.exe
            Filesize

            4.1MB

            MD5

            a6379db5b1abbfe8594cca160feceb45

            SHA1

            24d379bb6367f0ed2af47cbf0466c87fa5971955

            SHA256

            643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad

            SHA512

            68e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082

          • memory/3144-270-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/3144-277-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/3372-102-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/3372-98-0x000000007FD80000-0x000000007FD90000-memory.dmp
            Filesize

            64KB

          • memory/3372-72-0x00000000016B0000-0x00000000016C0000-memory.dmp
            Filesize

            64KB

          • memory/3372-78-0x0000000006250000-0x00000000065A4000-memory.dmp
            Filesize

            3.3MB

          • memory/3372-83-0x00000000016B0000-0x00000000016C0000-memory.dmp
            Filesize

            64KB

          • memory/3372-85-0x0000000070D30000-0x0000000070D7C000-memory.dmp
            Filesize

            304KB

          • memory/3372-86-0x00000000714D0000-0x0000000071824000-memory.dmp
            Filesize

            3.3MB

          • memory/3372-96-0x0000000007A70000-0x0000000007B13000-memory.dmp
            Filesize

            652KB

          • memory/3372-107-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/3372-104-0x0000000007DF0000-0x0000000007E04000-memory.dmp
            Filesize

            80KB

          • memory/3372-103-0x00000000016B0000-0x00000000016C0000-memory.dmp
            Filesize

            64KB

          • memory/3372-71-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/3372-99-0x0000000007D80000-0x0000000007D91000-memory.dmp
            Filesize

            68KB

          • memory/3728-127-0x0000000005160000-0x0000000005170000-memory.dmp
            Filesize

            64KB

          • memory/3728-129-0x0000000070D30000-0x0000000070D7C000-memory.dmp
            Filesize

            304KB

          • memory/3728-113-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/3728-114-0x0000000005160000-0x0000000005170000-memory.dmp
            Filesize

            64KB

          • memory/3728-115-0x0000000005160000-0x0000000005170000-memory.dmp
            Filesize

            64KB

          • memory/3728-125-0x0000000005F10000-0x0000000006264000-memory.dmp
            Filesize

            3.3MB

          • memory/3728-128-0x000000007F630000-0x000000007F640000-memory.dmp
            Filesize

            64KB

          • memory/4164-63-0x00000000072E0000-0x00000000072E8000-memory.dmp
            Filesize

            32KB

          • memory/4164-15-0x0000000004C60000-0x0000000004CC6000-memory.dmp
            Filesize

            408KB

          • memory/4164-56-0x00000000073A0000-0x0000000007436000-memory.dmp
            Filesize

            600KB

          • memory/4164-57-0x0000000007010000-0x0000000007021000-memory.dmp
            Filesize

            68KB

          • memory/4164-8-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/4164-59-0x000000007F3C0000-0x000000007F3D0000-memory.dmp
            Filesize

            64KB

          • memory/4164-60-0x00000000070C0000-0x00000000070CE000-memory.dmp
            Filesize

            56KB

          • memory/4164-61-0x0000000007380000-0x0000000007394000-memory.dmp
            Filesize

            80KB

          • memory/4164-62-0x0000000007460000-0x000000000747A000-memory.dmp
            Filesize

            104KB

          • memory/4164-9-0x0000000004810000-0x0000000004820000-memory.dmp
            Filesize

            64KB

          • memory/4164-67-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/4164-10-0x0000000002530000-0x0000000002566000-memory.dmp
            Filesize

            216KB

          • memory/4164-11-0x0000000004E50000-0x0000000005478000-memory.dmp
            Filesize

            6.2MB

          • memory/4164-54-0x00000000072F0000-0x00000000072FA000-memory.dmp
            Filesize

            40KB

          • memory/4164-53-0x0000000007210000-0x00000000072B3000-memory.dmp
            Filesize

            652KB

          • memory/4164-52-0x00000000071B0000-0x00000000071CE000-memory.dmp
            Filesize

            120KB

          • memory/4164-42-0x0000000071100000-0x0000000071454000-memory.dmp
            Filesize

            3.3MB

          • memory/4164-41-0x0000000070D30000-0x0000000070D7C000-memory.dmp
            Filesize

            304KB

          • memory/4164-40-0x00000000071D0000-0x0000000007202000-memory.dmp
            Filesize

            200KB

          • memory/4164-13-0x00000000048B0000-0x00000000048D2000-memory.dmp
            Filesize

            136KB

          • memory/4164-39-0x000000007F3C0000-0x000000007F3D0000-memory.dmp
            Filesize

            64KB

          • memory/4164-14-0x0000000074E90000-0x0000000075640000-memory.dmp
            Filesize

            7.7MB

          • memory/4164-38-0x0000000006FE0000-0x0000000006FFA000-memory.dmp
            Filesize

            104KB

          • memory/4164-37-0x0000000007640000-0x0000000007CBA000-memory.dmp
            Filesize

            6.5MB

          • memory/4164-55-0x0000000004810000-0x0000000004820000-memory.dmp
            Filesize

            64KB

          • memory/4164-16-0x0000000004CD0000-0x0000000004D36000-memory.dmp
            Filesize

            408KB

          • memory/4164-35-0x0000000006EC0000-0x0000000006F36000-memory.dmp
            Filesize

            472KB

          • memory/4164-34-0x0000000004810000-0x0000000004820000-memory.dmp
            Filesize

            64KB

          • memory/4164-33-0x00000000060C0000-0x0000000006104000-memory.dmp
            Filesize

            272KB

          • memory/4164-22-0x0000000004810000-0x0000000004820000-memory.dmp
            Filesize

            64KB

          • memory/4164-31-0x0000000005C80000-0x0000000005CCC000-memory.dmp
            Filesize

            304KB

          • memory/4164-23-0x0000000005570000-0x00000000058C4000-memory.dmp
            Filesize

            3.3MB

          • memory/4164-30-0x0000000005BB0000-0x0000000005BCE000-memory.dmp
            Filesize

            120KB

          • memory/4164-24-0x0000000004810000-0x0000000004820000-memory.dmp
            Filesize

            64KB

          • memory/4964-69-0x0000000004D80000-0x0000000005182000-memory.dmp
            Filesize

            4.0MB

          • memory/4964-109-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/4964-111-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/4964-176-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/4964-97-0x0000000004D80000-0x0000000005182000-memory.dmp
            Filesize

            4.0MB

          • memory/4964-100-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/4964-70-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/4964-168-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-36-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-2-0x00000000051B0000-0x0000000005A9B000-memory.dmp
            Filesize

            8.9MB

          • memory/5072-84-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-58-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-7-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-6-0x00000000051B0000-0x0000000005A9B000-memory.dmp
            Filesize

            8.9MB

          • memory/5072-5-0x0000000004DB0000-0x00000000051AD000-memory.dmp
            Filesize

            4.0MB

          • memory/5072-4-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-3-0x0000000000400000-0x0000000002FB8000-memory.dmp
            Filesize

            43.7MB

          • memory/5072-1-0x0000000004DB0000-0x00000000051AD000-memory.dmp
            Filesize

            4.0MB