Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 12:45

General

  • Target

    tmp.exe

  • Size

    4.7MB

  • MD5

    ba354d029f0e09cb6b02a4c196524da4

  • SHA1

    d8a3c4115cc46bc9a7b5216232c87d1a6471f09d

  • SHA256

    e70dcf3f915087251224a7db3850669c000a6da68ef2b55e3e2eda196cb01fc3

  • SHA512

    d27e3f6045f2915ed692d36f4152fc4dd7d1e6029e254d8e4fe4ce1d9dc5db8c6cb98cd7fab4c5762d6d2ad4c61dc5179486e70ebca5ce29ac5fc895daba4aed

  • SSDEEP

    98304:GkYNNP4ya1yMLo/NDRhzEdPPi2HuzH/zVhRpfR7pIy/unY5p8riqnzQ2ye:GkYN6yacM8/bhzEZDYHhhz57Gy/sQi02

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 22 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\ISetup4.exe
      "C:\Users\Admin\AppData\Local\Temp\ISetup4.exe"
      2⤵
      • Executes dropped EXE
      PID:2088
    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
      "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
        "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            • Modifies data under HKEY_USERS
            PID:296
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • Creates scheduled task(s)
            PID:348
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            5⤵
              PID:2128
            • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
              "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              PID:1564
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1420
    • C:\Windows\system32\makecab.exe
      "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240425124515.log C:\Windows\Logs\CBS\CbsPersist_20240425124515.cab
      1⤵
      • Drops file in Windows directory
      PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Cab2C12.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2D70.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
      Filesize

      5.3MB

      MD5

      1afff8d5352aecef2ecd47ffa02d7f7d

      SHA1

      8b115b84efdb3a1b87f750d35822b2609e665bef

      SHA256

      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

      SHA512

      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

    • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
      Filesize

      4.2MB

      MD5

      43b4b9050e5b237de2d1412de8781f36

      SHA1

      125cd51af3ca81d4c3e517b8405b9afae92b86f2

      SHA256

      97bb5c78c753aa5e39ffc3d4c1058f584d0241e9b19aff20a248f1f159fdca6d

      SHA512

      24e90d5a5d4a06e0d62ff2b5bc91e686f5cdb2e77fb4c31ef3b6a59f62afae9fc6642bb57576c334e46e234d10300a2814cca747cc315b52ea63b0226a6695d3

    • \Users\Admin\AppData\Local\Temp\ISetup4.exe
      Filesize

      464KB

      MD5

      44f814be76122897ef325f8938f8e4cf

      SHA1

      5f338e940d1ee1fa89523d13a0b289912e396d23

      SHA256

      2899d533753918409ab910b70ba92f8740f76c8e8ac74f4c890e53b258e3bff6

      SHA512

      daeb1a81dd4fe1578502d0c681c7e723273d06297c2fad7aeb74b1a06cd05f72a418af9571c82188525af329b3fef9785d588f1416d6ccf45ab58b589d8f0d79

    • \Users\Admin\AppData\Local\Temp\csrss\patch.exe
      Filesize

      1.7MB

      MD5

      13aaafe14eb60d6a718230e82c671d57

      SHA1

      e039dd924d12f264521b8e689426fb7ca95a0a7b

      SHA256

      f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

      SHA512

      ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

    • \Users\Admin\AppData\Local\Temp\dbghelp.dll
      Filesize

      1.5MB

      MD5

      f0616fa8bc54ece07e3107057f74e4db

      SHA1

      b33995c4f9a004b7d806c4bb36040ee844781fca

      SHA256

      6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

      SHA512

      15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

    • \Users\Admin\AppData\Local\Temp\symsrv.dll
      Filesize

      163KB

      MD5

      5c399d34d8dc01741269ff1f1aca7554

      SHA1

      e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

      SHA256

      e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

      SHA512

      8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

    • memory/1268-29-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/1268-21-0x0000000004960000-0x0000000004D58000-memory.dmp
      Filesize

      4.0MB

    • memory/1268-27-0x0000000004D60000-0x000000000564B000-memory.dmp
      Filesize

      8.9MB

    • memory/1268-24-0x0000000004960000-0x0000000004D58000-memory.dmp
      Filesize

      4.0MB

    • memory/1268-25-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/1268-32-0x0000000004960000-0x0000000004D58000-memory.dmp
      Filesize

      4.0MB

    • memory/1564-68-0x0000000140000000-0x00000001405E8000-memory.dmp
      Filesize

      5.9MB

    • memory/1564-69-0x0000000140000000-0x00000001405E8000-memory.dmp
      Filesize

      5.9MB

    • memory/1956-1-0x0000000001130000-0x00000000015E0000-memory.dmp
      Filesize

      4.7MB

    • memory/1956-23-0x0000000074520000-0x0000000074C0E000-memory.dmp
      Filesize

      6.9MB

    • memory/1956-0-0x0000000074520000-0x0000000074C0E000-memory.dmp
      Filesize

      6.9MB

    • memory/2088-13-0x0000000002FF0000-0x000000000305F000-memory.dmp
      Filesize

      444KB

    • memory/2088-35-0x00000000031E0000-0x00000000032E0000-memory.dmp
      Filesize

      1024KB

    • memory/2088-12-0x00000000031E0000-0x00000000032E0000-memory.dmp
      Filesize

      1024KB

    • memory/2088-22-0x0000000000400000-0x0000000002D72000-memory.dmp
      Filesize

      41.4MB

    • memory/2088-33-0x0000000000400000-0x0000000002D72000-memory.dmp
      Filesize

      41.4MB

    • memory/2292-144-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-148-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-47-0x0000000004FC0000-0x00000000058AB000-memory.dmp
      Filesize

      8.9MB

    • memory/2292-46-0x0000000004BC0000-0x0000000004FB8000-memory.dmp
      Filesize

      4.0MB

    • memory/2292-158-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-45-0x0000000004BC0000-0x0000000004FB8000-memory.dmp
      Filesize

      4.0MB

    • memory/2292-157-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-156-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-129-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-141-0x0000000004BC0000-0x0000000004FB8000-memory.dmp
      Filesize

      4.0MB

    • memory/2292-142-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-143-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-155-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-145-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-146-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-147-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-49-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-149-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-150-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2292-151-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2396-30-0x0000000004980000-0x0000000004D78000-memory.dmp
      Filesize

      4.0MB

    • memory/2396-31-0x0000000004980000-0x0000000004D78000-memory.dmp
      Filesize

      4.0MB

    • memory/2396-34-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB

    • memory/2396-44-0x0000000000400000-0x0000000003130000-memory.dmp
      Filesize

      45.2MB