Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 16:29

General

  • Target

    a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7.exe

  • Size

    4.2MB

  • MD5

    0199dfb09c2c2eb3af4f9e8efb6dadca

  • SHA1

    e8cad6ebd8d4817bdb5c3bd6119ee92273482a71

  • SHA256

    a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7

  • SHA512

    2b9e7d1288709f71409317b49011f0f864d4d5b70768d631153bfe38192589f8b182a57ffdcd24c8858ef7f11c0a50f7b682fcf6b13e6691284bd8104718d659

  • SSDEEP

    98304:Cq77jqY634qYqqku+lyD9j83bmq6chkYsndCeM49l0PC8vwYt3LS/Hh+:Cg7jqGqHumyZj83bqlTnjD0P2G3Ig

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 15 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
    • C:\Users\Admin\AppData\Local\Temp\a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7.exe
      "C:\Users\Admin\AppData\Local\Temp\a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:732
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3192
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1816
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3780
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:916
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1924
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:5100
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:3860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 476
          2⤵
          • Program crash
          PID:3940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2728 -ip 2728
        1⤵
          PID:3924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bik5vsbm.52g.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          1d34c6957b3b69607ce2b38f6a697936

          SHA1

          f8e736c8d9f8037aaaf62fccfe38b8a2d85e4b1d

          SHA256

          9fb66d19a1822d13cb117ddd1882ce20caf329a965d255150f59cb54bcf7b99a

          SHA512

          5984d0360ccf7993c28b9cbde845835a2fb20e1649e520385c49a51c54d187746e82e67f899878c0e17c0f60622f8f7fa54a7350a3e72aa84828ff994a24f19f

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          9745bdc99e985d873054d5948125db02

          SHA1

          759422ae317e2a2a227db81104f62e4328bdf49e

          SHA256

          2fecf809c5f208d2bd4625cab905df24d27b35fb442c72fbfc678a8401834ba8

          SHA512

          878ab78472de89c8d7ebd3c1b5ae50d2bd3d5bc1b3afc4043b62de7b92b42b482472a4bb19267233bcb92354b9120586f605b58a9017fa363e8020f5df6795be

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          7fa85b85f60b565b69e1d929e5d1a1e6

          SHA1

          954fd6346e8e4f1aef4b4d8da25b1b99d14b8c9c

          SHA256

          ba3520b3714fe152873f63a5aad570ef3db9550f9fb9d7fc314756cfc5c4b0e7

          SHA512

          453aaef1ea116409d3a9f5c2adb29a317556c44ef0608cb5e41bd21174e1f28bfda720887f902aace76163e5ff7dfcf65436cda64d492673a83d6b8a72a7033d

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          9c34870853ef91e5929633350f4ae154

          SHA1

          799661e0d3d69df69d26a3fed72a679f5ae3fd5a

          SHA256

          dcdd1852d796a4caede1d009c81d371491cfd6899db21ecdeaae186b62d09816

          SHA512

          3cf5212ca45433701973c2b077dd3413af67b23ce5e6e9d027ea1a705ca13b4b8d89453caea03fb16cb750acfafa1359e599b08a39526ff20f9758595e9d0a72

        • C:\Windows\rss\csrss.exe

          Filesize

          4.2MB

          MD5

          0199dfb09c2c2eb3af4f9e8efb6dadca

          SHA1

          e8cad6ebd8d4817bdb5c3bd6119ee92273482a71

          SHA256

          a3d6c15439eec7c90f015deab3e2fc930df70ab90630ad5a6c1a6bbebd3bc8b7

          SHA512

          2b9e7d1288709f71409317b49011f0f864d4d5b70768d631153bfe38192589f8b182a57ffdcd24c8858ef7f11c0a50f7b682fcf6b13e6691284bd8104718d659

        • memory/732-88-0x0000000005E40000-0x0000000005E8C000-memory.dmp

          Filesize

          304KB

        • memory/732-103-0x0000000007010000-0x0000000007021000-memory.dmp

          Filesize

          68KB

        • memory/732-90-0x00000000025A0000-0x00000000025B0000-memory.dmp

          Filesize

          64KB

        • memory/732-83-0x0000000005550000-0x00000000058A4000-memory.dmp

          Filesize

          3.3MB

        • memory/732-91-0x0000000070640000-0x000000007068C000-memory.dmp

          Filesize

          304KB

        • memory/732-92-0x0000000070DE0000-0x0000000071134000-memory.dmp

          Filesize

          3.3MB

        • memory/732-102-0x0000000006D30000-0x0000000006DD3000-memory.dmp

          Filesize

          652KB

        • memory/732-76-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/732-77-0x00000000025A0000-0x00000000025B0000-memory.dmp

          Filesize

          64KB

        • memory/732-107-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/732-104-0x0000000007060000-0x0000000007074000-memory.dmp

          Filesize

          80KB

        • memory/1816-126-0x00000000707E0000-0x0000000070B34000-memory.dmp

          Filesize

          3.3MB

        • memory/1816-109-0x00000000050E0000-0x00000000050F0000-memory.dmp

          Filesize

          64KB

        • memory/1816-110-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/1816-120-0x0000000006120000-0x0000000006474000-memory.dmp

          Filesize

          3.3MB

        • memory/1816-123-0x00000000050E0000-0x00000000050F0000-memory.dmp

          Filesize

          64KB

        • memory/1816-124-0x000000007FCA0000-0x000000007FCB0000-memory.dmp

          Filesize

          64KB

        • memory/1816-125-0x0000000070640000-0x000000007068C000-memory.dmp

          Filesize

          304KB

        • memory/1816-138-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-30-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-31-0x0000000007790000-0x0000000007806000-memory.dmp

          Filesize

          472KB

        • memory/1820-38-0x00000000079E0000-0x0000000007A12000-memory.dmp

          Filesize

          200KB

        • memory/1820-39-0x0000000070540000-0x000000007058C000-memory.dmp

          Filesize

          304KB

        • memory/1820-40-0x0000000070940000-0x0000000070C94000-memory.dmp

          Filesize

          3.3MB

        • memory/1820-50-0x00000000079C0000-0x00000000079DE000-memory.dmp

          Filesize

          120KB

        • memory/1820-51-0x0000000007A20000-0x0000000007AC3000-memory.dmp

          Filesize

          652KB

        • memory/1820-52-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-53-0x0000000007B30000-0x0000000007B3A000-memory.dmp

          Filesize

          40KB

        • memory/1820-5-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-55-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-57-0x0000000007C40000-0x0000000007CD6000-memory.dmp

          Filesize

          600KB

        • memory/1820-59-0x0000000007B60000-0x0000000007B71000-memory.dmp

          Filesize

          68KB

        • memory/1820-60-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

          Filesize

          64KB

        • memory/1820-62-0x0000000007720000-0x000000000772E000-memory.dmp

          Filesize

          56KB

        • memory/1820-65-0x0000000007730000-0x0000000007744000-memory.dmp

          Filesize

          80KB

        • memory/1820-66-0x0000000007BA0000-0x0000000007BBA000-memory.dmp

          Filesize

          104KB

        • memory/1820-68-0x0000000000BA0000-0x0000000000BA8000-memory.dmp

          Filesize

          32KB

        • memory/1820-71-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-6-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-7-0x0000000004E90000-0x0000000004EC6000-memory.dmp

          Filesize

          216KB

        • memory/1820-11-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-36-0x0000000007830000-0x000000000784A000-memory.dmp

          Filesize

          104KB

        • memory/1820-35-0x0000000007E90000-0x000000000850A000-memory.dmp

          Filesize

          6.5MB

        • memory/1820-34-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/1820-12-0x0000000005670000-0x0000000005C98000-memory.dmp

          Filesize

          6.2MB

        • memory/1820-13-0x0000000005350000-0x0000000005372000-memory.dmp

          Filesize

          136KB

        • memory/1820-32-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-37-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

          Filesize

          64KB

        • memory/1820-14-0x00000000055F0000-0x0000000005656000-memory.dmp

          Filesize

          408KB

        • memory/1820-29-0x0000000006A10000-0x0000000006A54000-memory.dmp

          Filesize

          272KB

        • memory/1820-27-0x0000000006490000-0x00000000064DC000-memory.dmp

          Filesize

          304KB

        • memory/1820-26-0x0000000006460000-0x000000000647E000-memory.dmp

          Filesize

          120KB

        • memory/1820-25-0x0000000005E40000-0x0000000006194000-memory.dmp

          Filesize

          3.3MB

        • memory/1820-20-0x0000000005DD0000-0x0000000005E36000-memory.dmp

          Filesize

          408KB

        • memory/2364-136-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-89-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-171-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-75-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-122-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-165-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2364-74-0x0000000004DD0000-0x00000000051C9000-memory.dmp

          Filesize

          4.0MB

        • memory/2728-10-0x0000000005260000-0x0000000005B4B000-memory.dmp

          Filesize

          8.9MB

        • memory/2728-73-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-8-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-9-0x0000000004E50000-0x0000000005251000-memory.dmp

          Filesize

          4.0MB

        • memory/2728-54-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-1-0x0000000004E50000-0x0000000005251000-memory.dmp

          Filesize

          4.0MB

        • memory/2728-4-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-33-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-3-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB

        • memory/2728-2-0x0000000005260000-0x0000000005B4B000-memory.dmp

          Filesize

          8.9MB

        • memory/3780-139-0x0000000074740000-0x0000000074EF0000-memory.dmp

          Filesize

          7.7MB

        • memory/3780-140-0x0000000004840000-0x0000000004850000-memory.dmp

          Filesize

          64KB

        • memory/4572-237-0x0000000000400000-0x0000000003105000-memory.dmp

          Filesize

          45.0MB