Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 21:05

General

  • Target

    8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe

  • Size

    4.1MB

  • MD5

    40ec068d634041e8b5147b6f53660280

  • SHA1

    91bef547550e7c170acfbdc82b3eb697d9edcf6b

  • SHA256

    8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9

  • SHA512

    1531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031

  • SSDEEP

    98304:t+y11xVaNS4L/TrpL65fuCbh9zp4wSpOL2zCwTSYgUegPrjqR:tXbVaNSc/pL68Wh9t71C3xbeerg

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe
    "C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3896
    • C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe
      "C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4012
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4440
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3896
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1628
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:1876
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3352
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:3472

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xklyebds.swo.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        3d086a433708053f9bf9523e1d87a4e8

        SHA1

        b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

        SHA256

        6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

        SHA512

        931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        ba954d997a86271070f480faff51adcb

        SHA1

        29641fdf3c219a1e2c2bb329c575656ca21a270e

        SHA256

        767c3f58577c9627af32646a8812e5381a4e46906cd2305801e5c1139660d7c5

        SHA512

        634fbcb98e08ef38faf0bae7f711fe4235603d366f45ea9a916915c63efe18c4d97183e7a30d0f63978f0f3f400f2dddd9a1beb17a2483f3a476d0c28ce5b8ae

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        7319f864e60ec9d248026dba2f065b42

        SHA1

        71984e3593fbc4e68ecea43310568f5fa976b77e

        SHA256

        783d211b0437ac6fe85a7c4f3dc83b7374d55a8e653a1932b8fe79f56125fa30

        SHA512

        a7617432d9fa3c284a30ff463f00c8c606d5258f3363a51d97905baa972a6f17fb801acfd9ae56b93c8613fbdf861dda054d2cf695eff5c071d37fb8c37b92e6

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        a6b9d97e9d86b2f5864add0b0329e0b0

        SHA1

        90586f15129c00dad682475141a85442b59c31f1

        SHA256

        657d06ac109478a8503465802a8fa73e79a70472ff2bdc6462bd091aed7622f1

        SHA512

        8ad8bc4dfa309fe1bfea48af4b85e98ab91de5e4b53a24ba0b826fd2f357a3855c83737873a0e81951c3a1773ffa1c554de86a491985b0b23e70dc55e1cb21e9

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        a01068f51ef8eb3816264bc92d1c35d7

        SHA1

        d5dfc47dc8efe9b229aa462acb4940b8da6e06df

        SHA256

        5063e1d1a2d02e2d77c64accaf274cdbdb3bab798241b32b98a04a4d970cc24f

        SHA512

        9986256ba65eaf1a81e017afc493fa01221e69f4e2b02b2c01d05dd1662a2eb5cec91eadae5637edf8a98abfeab0db0bf6fa509d8a2051b461b023ef1eafa397

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        df38867390dc654ee79b4a52ab806a9e

        SHA1

        4a7bba455ecce4f6e981049b5c6e4277a1619de7

        SHA256

        b675e1d6b33cc58f9963905ba89396510cfedb578af7dc4a24d7da080cab9070

        SHA512

        80745ea1a3e94422aa12c9c8c479f7d761c447976b04801d2222ad1c6d8175814f7f987b03df9a82fccc553dad7bb1ae3c2fb709acb83d2d04c1277f23532b70

      • C:\Windows\rss\csrss.exe

        Filesize

        4.1MB

        MD5

        40ec068d634041e8b5147b6f53660280

        SHA1

        91bef547550e7c170acfbdc82b3eb697d9edcf6b

        SHA256

        8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9

        SHA512

        1531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031

      • C:\Windows\rss\csrss.exe

        Filesize

        4.1MB

        MD5

        40ec068d634041e8b5147b6f53660280

        SHA1

        91bef547550e7c170acfbdc82b3eb697d9edcf6b

        SHA256

        8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9

        SHA512

        1531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031

      • memory/1132-149-0x0000000005B50000-0x0000000005EA4000-memory.dmp

        Filesize

        3.3MB

      • memory/1132-137-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/1132-138-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/1180-85-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/1180-79-0x0000000005E90000-0x00000000061E4000-memory.dmp

        Filesize

        3.3MB

      • memory/1180-72-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/1180-71-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/1180-103-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/1180-73-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/1180-86-0x000000007F9A0000-0x000000007F9B0000-memory.dmp

        Filesize

        64KB

      • memory/1180-87-0x0000000070680000-0x00000000706CC000-memory.dmp

        Filesize

        304KB

      • memory/1180-88-0x0000000070DE0000-0x0000000071134000-memory.dmp

        Filesize

        3.3MB

      • memory/1180-98-0x0000000007510000-0x00000000075B3000-memory.dmp

        Filesize

        652KB

      • memory/1180-99-0x0000000007A10000-0x0000000007A21000-memory.dmp

        Filesize

        68KB

      • memory/1180-100-0x0000000007A80000-0x0000000007A94000-memory.dmp

        Filesize

        80KB

      • memory/2064-136-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/2064-122-0x00000000045D0000-0x00000000045E0000-memory.dmp

        Filesize

        64KB

      • memory/2064-124-0x0000000070DE0000-0x0000000071134000-memory.dmp

        Filesize

        3.3MB

      • memory/2064-109-0x00000000045D0000-0x00000000045E0000-memory.dmp

        Filesize

        64KB

      • memory/2064-110-0x00000000045D0000-0x00000000045E0000-memory.dmp

        Filesize

        64KB

      • memory/2064-108-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/2064-123-0x0000000070680000-0x00000000706CC000-memory.dmp

        Filesize

        304KB

      • memory/2796-66-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2796-4-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2796-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2796-11-0x0000000002B50000-0x0000000002F54000-memory.dmp

        Filesize

        4.0MB

      • memory/2796-56-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2796-2-0x0000000002F60000-0x000000000384B000-memory.dmp

        Filesize

        8.9MB

      • memory/2796-1-0x0000000002B50000-0x0000000002F54000-memory.dmp

        Filesize

        4.0MB

      • memory/2796-12-0x0000000002F60000-0x000000000384B000-memory.dmp

        Filesize

        8.9MB

      • memory/2796-37-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2796-8-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-168-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-104-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-134-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-68-0x0000000002AB0000-0x0000000002EB2000-memory.dmp

        Filesize

        4.0MB

      • memory/2968-69-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-70-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-111-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2968-105-0x0000000002AB0000-0x0000000002EB2000-memory.dmp

        Filesize

        4.0MB

      • memory/3896-32-0x0000000006970000-0x00000000069BC000-memory.dmp

        Filesize

        304KB

      • memory/3896-36-0x0000000007BA0000-0x0000000007C16000-memory.dmp

        Filesize

        472KB

      • memory/3896-62-0x0000000001210000-0x0000000001218000-memory.dmp

        Filesize

        32KB

      • memory/3896-61-0x0000000001220000-0x000000000123A000-memory.dmp

        Filesize

        104KB

      • memory/3896-60-0x0000000008040000-0x0000000008054000-memory.dmp

        Filesize

        80KB

      • memory/3896-59-0x0000000008020000-0x000000000802E000-memory.dmp

        Filesize

        56KB

      • memory/3896-58-0x0000000007FE0000-0x0000000007FF1000-memory.dmp

        Filesize

        68KB

      • memory/3896-57-0x00000000080E0000-0x0000000008176000-memory.dmp

        Filesize

        600KB

      • memory/3896-55-0x0000000007FD0000-0x0000000007FDA000-memory.dmp

        Filesize

        40KB

      • memory/3896-54-0x0000000007E50000-0x0000000007EF3000-memory.dmp

        Filesize

        652KB

      • memory/3896-53-0x0000000007DF0000-0x0000000007E0E000-memory.dmp

        Filesize

        120KB

      • memory/3896-43-0x0000000070800000-0x0000000070B54000-memory.dmp

        Filesize

        3.3MB

      • memory/3896-42-0x0000000070680000-0x00000000706CC000-memory.dmp

        Filesize

        304KB

      • memory/3896-41-0x0000000007E10000-0x0000000007E42000-memory.dmp

        Filesize

        200KB

      • memory/3896-40-0x000000007F5D0000-0x000000007F5E0000-memory.dmp

        Filesize

        64KB

      • memory/3896-39-0x0000000007C40000-0x0000000007C5A000-memory.dmp

        Filesize

        104KB

      • memory/3896-38-0x00000000082A0000-0x000000000891A000-memory.dmp

        Filesize

        6.5MB

      • memory/3896-65-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/3896-35-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/3896-34-0x0000000006E90000-0x0000000006ED4000-memory.dmp

        Filesize

        272KB

      • memory/3896-31-0x0000000006870000-0x000000000688E000-memory.dmp

        Filesize

        120KB

      • memory/3896-30-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/3896-29-0x00000000063B0000-0x0000000006704000-memory.dmp

        Filesize

        3.3MB

      • memory/3896-24-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/3896-18-0x0000000006040000-0x00000000060A6000-memory.dmp

        Filesize

        408KB

      • memory/3896-17-0x0000000005FD0000-0x0000000006036000-memory.dmp

        Filesize

        408KB

      • memory/3896-16-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/3896-14-0x00000000058B0000-0x00000000058D2000-memory.dmp

        Filesize

        136KB

      • memory/3896-10-0x0000000005930000-0x0000000005F58000-memory.dmp

        Filesize

        6.2MB

      • memory/3896-9-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/3896-5-0x00000000747E0000-0x0000000074F90000-memory.dmp

        Filesize

        7.7MB

      • memory/3896-7-0x00000000052C0000-0x00000000052F6000-memory.dmp

        Filesize

        216KB

      • memory/3896-6-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB

      • memory/4440-236-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/4440-173-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB