Analysis

  • max time kernel
    49s
  • max time network
    53s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-04-2024 15:06

Errors

Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-22T15:07:58Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win11-20240412-en/instance_15-dirty.qcow2\"}"

General

  • Target

    15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe

  • Size

    4.2MB

  • MD5

    9649f6f868bed5e94efcbc808afc962d

  • SHA1

    8863e6ec1a2791f580c5d3e6f3f6e4a961908743

  • SHA256

    15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271

  • SHA512

    ede10fbbdcd7dc161c7a13f5aa0dabae664c96e8e1f3abbdbbd0733ae4186e2a65536e059757ea77ec07348fd7d81e7b4bd788cb32fcc53b41c5b40a81a0ad6e

  • SSDEEP

    98304:emG+ILlmwFOXti2i4yafdSAta9/r6eiiYAoaUebjXDBdI:DV62/i4yafdST/r6FFcTBdI

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe
    "C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2092
    • C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe
      "C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:128
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4020
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1620
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2388
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2920
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4768
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5024
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2776
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:904
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:3964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ro4z1yfg.isy.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        ac4917a885cf6050b1a483e4bc4d2ea5

        SHA1

        b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

        SHA256

        e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

        SHA512

        092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        2ebeccbcd1f0cd37958949ea53a675db

        SHA1

        ef59a31ffc9ec0beeddfa9d5c896ff02aa0c277f

        SHA256

        080e03951abb41ee5de0c1951a674563a4af7cf5b0a5b4706752c4cd1ae50c8d

        SHA512

        c531ee0fdf60fc9c1f46dccf94f76f2c79eebc65cc7c239947c1ca86f673047b078d5012b97a23446a8f4200b7b810dfe03c9080700a7e1bb66da85afa7625ef

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        aae7ab1e64579ec1412ec1e098103fc8

        SHA1

        3d17f39c86c332da0de502c9b468919986beedee

        SHA256

        5c0f7bc4c87125d9a0e22c2c876828dcfea74b3acf969b7ad17834f3a4a33080

        SHA512

        6504d0d52f1adc1414b7dedb77d74120c71d515c3b4a5c0ea39137b2e36607301f757e9e6d2651db7be3d210cb9f112a97bd3e96ea7f5ed385521538f6b8cee2

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        d5388001eccaf0d8ba45f0d9c03f105f

        SHA1

        d661c352b74452f796afb797c439afc9f612a425

        SHA256

        00195d613ef8e1c4c12df2db6d1929cb1fd06c64454f16f582e4e0c975e55041

        SHA512

        cb4169ce9f67b71b989aa1a3369f1cda5003df51cfa98e755f51f0449e2b76cf6c53ecb5535707d72e8149b89b61b5d4cf32b91c0b8b46f7cb1b741c8a597fec

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        9649f6f868bed5e94efcbc808afc962d

        SHA1

        8863e6ec1a2791f580c5d3e6f3f6e4a961908743

        SHA256

        15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271

        SHA512

        ede10fbbdcd7dc161c7a13f5aa0dabae664c96e8e1f3abbdbbd0733ae4186e2a65536e059757ea77ec07348fd7d81e7b4bd788cb32fcc53b41c5b40a81a0ad6e

      • memory/128-55-0x0000000003770000-0x0000000003B70000-memory.dmp

        Filesize

        4.0MB

      • memory/128-149-0x0000000000400000-0x0000000003009000-memory.dmp

        Filesize

        44.0MB

      • memory/128-130-0x0000000003770000-0x0000000003B70000-memory.dmp

        Filesize

        4.0MB

      • memory/128-102-0x0000000000400000-0x0000000003009000-memory.dmp

        Filesize

        44.0MB

      • memory/128-56-0x0000000000400000-0x0000000003009000-memory.dmp

        Filesize

        44.0MB

      • memory/2092-35-0x0000000007750000-0x000000000776E000-memory.dmp

        Filesize

        120KB

      • memory/2092-10-0x0000000005CD0000-0x0000000005D36000-memory.dmp

        Filesize

        408KB

      • memory/2092-21-0x0000000006320000-0x000000000636C000-memory.dmp

        Filesize

        304KB

      • memory/2092-22-0x00000000066F0000-0x0000000006736000-memory.dmp

        Filesize

        280KB

      • memory/2092-25-0x0000000070720000-0x000000007076C000-memory.dmp

        Filesize

        304KB

      • memory/2092-24-0x0000000007710000-0x0000000007744000-memory.dmp

        Filesize

        208KB

      • memory/2092-26-0x00000000708A0000-0x0000000070BF7000-memory.dmp

        Filesize

        3.3MB

      • memory/2092-4-0x0000000004E20000-0x0000000004E56000-memory.dmp

        Filesize

        216KB

      • memory/2092-23-0x000000007F1B0000-0x000000007F1C0000-memory.dmp

        Filesize

        64KB

      • memory/2092-37-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2092-36-0x0000000007770000-0x0000000007814000-memory.dmp

        Filesize

        656KB

      • memory/2092-39-0x00000000078A0000-0x00000000078BA000-memory.dmp

        Filesize

        104KB

      • memory/2092-40-0x00000000078E0000-0x00000000078EA000-memory.dmp

        Filesize

        40KB

      • memory/2092-38-0x0000000007EE0000-0x000000000855A000-memory.dmp

        Filesize

        6.5MB

      • memory/2092-41-0x00000000079F0000-0x0000000007A86000-memory.dmp

        Filesize

        600KB

      • memory/2092-42-0x0000000007900000-0x0000000007911000-memory.dmp

        Filesize

        68KB

      • memory/2092-43-0x0000000007950000-0x000000000795E000-memory.dmp

        Filesize

        56KB

      • memory/2092-44-0x0000000007960000-0x0000000007975000-memory.dmp

        Filesize

        84KB

      • memory/2092-45-0x00000000079B0000-0x00000000079CA000-memory.dmp

        Filesize

        104KB

      • memory/2092-46-0x00000000079D0000-0x00000000079D8000-memory.dmp

        Filesize

        32KB

      • memory/2092-49-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/2092-5-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/2092-6-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2092-7-0x0000000005550000-0x0000000005B7A000-memory.dmp

        Filesize

        6.2MB

      • memory/2092-19-0x0000000005E90000-0x00000000061E7000-memory.dmp

        Filesize

        3.3MB

      • memory/2092-9-0x0000000005BF0000-0x0000000005C56000-memory.dmp

        Filesize

        408KB

      • memory/2092-20-0x00000000062D0000-0x00000000062EE000-memory.dmp

        Filesize

        120KB

      • memory/2092-8-0x0000000005420000-0x0000000005442000-memory.dmp

        Filesize

        136KB

      • memory/2388-103-0x0000000070720000-0x000000007076C000-memory.dmp

        Filesize

        304KB

      • memory/2388-113-0x000000007F3B0000-0x000000007F3C0000-memory.dmp

        Filesize

        64KB

      • memory/2388-91-0x0000000002F60000-0x0000000002F70000-memory.dmp

        Filesize

        64KB

      • memory/2388-90-0x0000000002F60000-0x0000000002F70000-memory.dmp

        Filesize

        64KB

      • memory/2388-89-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/2388-104-0x0000000070970000-0x0000000070CC7000-memory.dmp

        Filesize

        3.3MB

      • memory/2388-100-0x0000000006230000-0x0000000006587000-memory.dmp

        Filesize

        3.3MB

      • memory/2388-117-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/2388-114-0x0000000002F60000-0x0000000002F70000-memory.dmp

        Filesize

        64KB

      • memory/2388-115-0x0000000002F60000-0x0000000002F70000-memory.dmp

        Filesize

        64KB

      • memory/2920-118-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/2920-120-0x00000000030F0000-0x0000000003100000-memory.dmp

        Filesize

        64KB

      • memory/2920-119-0x00000000030F0000-0x0000000003100000-memory.dmp

        Filesize

        64KB

      • memory/2920-131-0x0000000070720000-0x000000007076C000-memory.dmp

        Filesize

        304KB

      • memory/2920-132-0x0000000070970000-0x0000000070CC7000-memory.dmp

        Filesize

        3.3MB

      • memory/4020-84-0x0000000007D50000-0x0000000007D65000-memory.dmp

        Filesize

        84KB

      • memory/4020-82-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB

      • memory/4020-57-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB

      • memory/4020-59-0x0000000006110000-0x0000000006467000-memory.dmp

        Filesize

        3.3MB

      • memory/4020-69-0x000000007FBA0000-0x000000007FBB0000-memory.dmp

        Filesize

        64KB

      • memory/4020-87-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/4020-68-0x00000000744B0000-0x0000000074C61000-memory.dmp

        Filesize

        7.7MB

      • memory/4020-83-0x0000000007D00000-0x0000000007D11000-memory.dmp

        Filesize

        68KB

      • memory/4020-80-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB

      • memory/4020-58-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB

      • memory/4020-81-0x0000000007800000-0x00000000078A4000-memory.dmp

        Filesize

        656KB

      • memory/4020-71-0x0000000070950000-0x0000000070CA7000-memory.dmp

        Filesize

        3.3MB

      • memory/4020-70-0x0000000070720000-0x000000007076C000-memory.dmp

        Filesize

        304KB

      • memory/5104-52-0x00000000036E0000-0x0000000003AE2000-memory.dmp

        Filesize

        4.0MB

      • memory/5104-53-0x0000000005290000-0x0000000005B7B000-memory.dmp

        Filesize

        8.9MB

      • memory/5104-51-0x0000000000400000-0x0000000003009000-memory.dmp

        Filesize

        44.0MB

      • memory/5104-1-0x00000000036E0000-0x0000000003AE2000-memory.dmp

        Filesize

        4.0MB

      • memory/5104-3-0x0000000000400000-0x0000000003009000-memory.dmp

        Filesize

        44.0MB

      • memory/5104-2-0x0000000005290000-0x0000000005B7B000-memory.dmp

        Filesize

        8.9MB