Analysis

  • max time kernel
    15s
  • max time network
    133s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/05/2024, 23:11

General

  • Target

    15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75.exe

  • Size

    4.2MB

  • MD5

    a8f1fcc737e535dff0fa0f40bd188cc4

  • SHA1

    2412d0827435029553b0143a2f71e833dfeb9334

  • SHA256

    15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75

  • SHA512

    16551bf446a148014edb54935cca0e64a8650e700077f1d8e566868a76a2b55dff2decc6e959cfe4a9598fee805727d4c6650cd91e086a996e8bc9a65241e14c

  • SSDEEP

    98304:PuG3QFxSNkN4u615vkopeNoVxTRrGDAQtoqh8RdhY:PuIxyNs5vbp4oV5VPa8RdO

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75.exe
    "C:\Users\Admin\AppData\Local\Temp\15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4712
    • C:\Users\Admin\AppData\Local\Temp\15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75.exe
      "C:\Users\Admin\AppData\Local\Temp\15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75.exe"
      2⤵
      • Modifies data under HKEY_USERS
      PID:3892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
          PID:3036
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          3⤵
            PID:3572
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              4⤵
              • Modifies Windows Firewall
              PID:1372
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            3⤵
              PID:3672
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              3⤵
                PID:1456
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                3⤵
                  PID:3680
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    4⤵
                      PID:3436
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      4⤵
                      • Creates scheduled task(s)
                      PID:3744
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /delete /tn ScheduledUpdate /f
                      4⤵
                        PID:3392
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                          PID:4932
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                            PID:1636
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            4⤵
                              PID:3480
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              4⤵
                              • Creates scheduled task(s)
                              PID:4960
                            • C:\Windows\windefender.exe
                              "C:\Windows\windefender.exe"
                              4⤵
                                PID:4852
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  5⤵
                                    PID:2496
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                      6⤵
                                      • Launches sc.exe
                                      PID:440
                          • C:\Windows\windefender.exe
                            C:\Windows\windefender.exe
                            1⤵
                              PID:720

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zgyk2qew.tuy.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                              Filesize

                              281KB

                              MD5

                              d98e33b66343e7c96158444127a117f6

                              SHA1

                              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                              SHA256

                              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                              SHA512

                              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              ac4917a885cf6050b1a483e4bc4d2ea5

                              SHA1

                              b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                              SHA256

                              e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                              SHA512

                              092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              19KB

                              MD5

                              82d2fea83e4e39ac0b61a6ccafa0adfc

                              SHA1

                              f5a7b8749a021c45beba19ab43437d8a356b797a

                              SHA256

                              20c34d4370342929dcc3ee8e77da537155cbbd7076c81a43d32a96383ccf06ba

                              SHA512

                              eb6c42de3d25af4702acee572422682f3f7c3a156882658c6e2d582bdc873a9afb18305b69c3a7ba576df6b7eb079a635a182071bcf52cc6e98a299a42f4278c

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              19KB

                              MD5

                              d5d9958f087864b580d74e92ca053822

                              SHA1

                              e743d27d6ecbaea4448268c9ff7f0f3ffc2e1852

                              SHA256

                              4b8224b4f2a64c7f0c098617d4ae8c39cccc7e98ae2f4ab1ab0085b453bb82c0

                              SHA512

                              5b517b2cf34fdd47b841a8fd8f0cb8509dd91bc98508e47be0f1f7fa0cac360695eca517b8039333f509fddccbe83df0178823e52a3a9e276ad6d4790746b228

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              19KB

                              MD5

                              c12d2d373d470359f00de82cdd2f18ac

                              SHA1

                              131e91ee0c8fe0560ad7b2e4664d2bf1078a5725

                              SHA256

                              b4b1aeaec4a6acb82132da26b81c83720e17ebff0942d32d1d227aa1f1184bdb

                              SHA512

                              9c6d96bb7cb0b2a91cb3d60d89af0032555cfbeb19386382c3f00460515b56b332d682752bbc5cfc261956fbb81c0c88e754371d179e218e75a8c017df2e9caf

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              19KB

                              MD5

                              bb32c1cf34b8cd4cea7abdea415260b5

                              SHA1

                              ace365212bdd6efa2ab0e11616a7603e4db896b2

                              SHA256

                              7546c5d5a91d9897b088fc38db5e22d8ad32aa80c2db8fc52f72c3c8e4a11bde

                              SHA512

                              8344bef5be5e2cf2796cac9fcd83e27c5ca1fdf4405049d855eef29f07f26dbb254b981e621d5eb61eb919411a829c1e26f44ba1907a533233f2c4ec84296ead

                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                              Filesize

                              19KB

                              MD5

                              bdae4b9354cd6dbf17fc3b2512573fd6

                              SHA1

                              e6e39a24445576455c377d454a8a71cb836d031c

                              SHA256

                              31302528c1413e1909f765735ab32bb5112830a2ed40c2f27cce253e3c3d599e

                              SHA512

                              37c1676d56566154c00554adbdc33755b14b491aa44d7a5733ae740f3a833ad1aa929d1532f0fdc108410972f9f3cb9bd723796ad01643f4b619fc9b230c1f1a

                            • C:\Windows\rss\csrss.exe

                              Filesize

                              4.2MB

                              MD5

                              a8f1fcc737e535dff0fa0f40bd188cc4

                              SHA1

                              2412d0827435029553b0143a2f71e833dfeb9334

                              SHA256

                              15072cfd9b374e263522dfe3791cb03dd5bd2649389caba546d253a30834da75

                              SHA512

                              16551bf446a148014edb54935cca0e64a8650e700077f1d8e566868a76a2b55dff2decc6e959cfe4a9598fee805727d4c6650cd91e086a996e8bc9a65241e14c

                            • C:\Windows\windefender.exe

                              Filesize

                              2.0MB

                              MD5

                              8e67f58837092385dcf01e8a2b4f5783

                              SHA1

                              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                              SHA256

                              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                              SHA512

                              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                            • memory/456-50-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/456-59-0x00000000035F0000-0x00000000039F5000-memory.dmp

                              Filesize

                              4.0MB

                            • memory/456-1-0x00000000035F0000-0x00000000039F5000-memory.dmp

                              Filesize

                              4.0MB

                            • memory/456-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/456-126-0x0000000000400000-0x0000000000D1C000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/456-125-0x00000000051A0000-0x0000000005A8B000-memory.dmp

                              Filesize

                              8.9MB

                            • memory/456-2-0x00000000051A0000-0x0000000005A8B000-memory.dmp

                              Filesize

                              8.9MB

                            • memory/720-207-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/720-216-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/720-224-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/720-236-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/1456-105-0x0000000005DF0000-0x0000000006147000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1456-107-0x0000000070930000-0x000000007097C000-memory.dmp

                              Filesize

                              304KB

                            • memory/1456-108-0x0000000070AD0000-0x0000000070E27000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1636-175-0x0000000006210000-0x0000000006567000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1636-183-0x0000000070AA0000-0x0000000070DF7000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1636-182-0x0000000070850000-0x000000007089C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3036-60-0x0000000070930000-0x000000007097C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3036-72-0x0000000007ED0000-0x0000000007EE5000-memory.dmp

                              Filesize

                              84KB

                            • memory/3036-71-0x0000000007E80000-0x0000000007E91000-memory.dmp

                              Filesize

                              68KB

                            • memory/3036-70-0x0000000007B60000-0x0000000007C04000-memory.dmp

                              Filesize

                              656KB

                            • memory/3036-61-0x0000000070AB0000-0x0000000070E07000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3436-136-0x0000000070930000-0x000000007097C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3436-137-0x0000000070AB0000-0x0000000070E07000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3672-86-0x0000000070930000-0x000000007097C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3672-84-0x0000000005D30000-0x0000000006087000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3672-87-0x0000000070B80000-0x0000000070ED7000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3680-235-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-243-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-247-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-239-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-195-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-252-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-231-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-226-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-223-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-219-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-215-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3680-212-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/3892-124-0x0000000000400000-0x0000000002EE9000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/4712-7-0x00000000746C0000-0x0000000074E71000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4712-37-0x0000000007750000-0x0000000007DCA000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4712-25-0x0000000070930000-0x000000007097C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4712-23-0x00000000060F0000-0x0000000006136000-memory.dmp

                              Filesize

                              280KB

                            • memory/4712-45-0x0000000007240000-0x0000000007248000-memory.dmp

                              Filesize

                              32KB

                            • memory/4712-22-0x0000000005C00000-0x0000000005C4C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4712-44-0x0000000007220000-0x000000000723A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4712-43-0x00000000071D0000-0x00000000071E5000-memory.dmp

                              Filesize

                              84KB

                            • memory/4712-42-0x00000000071C0000-0x00000000071CE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4712-41-0x0000000007170000-0x0000000007181000-memory.dmp

                              Filesize

                              68KB

                            • memory/4712-4-0x00000000746CE000-0x00000000746CF000-memory.dmp

                              Filesize

                              4KB

                            • memory/4712-40-0x0000000007260000-0x00000000072F6000-memory.dmp

                              Filesize

                              600KB

                            • memory/4712-21-0x0000000005B60000-0x0000000005B7E000-memory.dmp

                              Filesize

                              120KB

                            • memory/4712-20-0x00000000056C0000-0x0000000005A17000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4712-11-0x0000000005650000-0x00000000056B6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4712-10-0x0000000005570000-0x00000000055D6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4712-26-0x0000000070AB0000-0x0000000070E07000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4712-9-0x00000000054D0000-0x00000000054F2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4712-8-0x00000000746C0000-0x0000000074E71000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4712-39-0x0000000007150000-0x000000000715A000-memory.dmp

                              Filesize

                              40KB

                            • memory/4712-48-0x00000000746C0000-0x0000000074E71000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4712-38-0x0000000007110000-0x000000000712A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4712-35-0x0000000006FC0000-0x0000000006FDE000-memory.dmp

                              Filesize

                              120KB

                            • memory/4712-6-0x0000000004E60000-0x000000000548A000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4712-36-0x0000000006FE0000-0x0000000007084000-memory.dmp

                              Filesize

                              656KB

                            • memory/4712-24-0x0000000006F60000-0x0000000006F94000-memory.dmp

                              Filesize

                              208KB

                            • memory/4712-5-0x00000000046C0000-0x00000000046F6000-memory.dmp

                              Filesize

                              216KB

                            • memory/4852-209-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/4852-205-0x0000000000400000-0x00000000008DF000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/4932-170-0x0000000006000000-0x0000000006015000-memory.dmp

                              Filesize

                              84KB

                            • memory/4932-169-0x0000000007790000-0x00000000077A1000-memory.dmp

                              Filesize

                              68KB

                            • memory/4932-168-0x00000000074C0000-0x0000000007564000-memory.dmp

                              Filesize

                              656KB

                            • memory/4932-159-0x0000000071190000-0x00000000714E7000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4932-158-0x0000000070850000-0x000000007089C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4932-157-0x0000000006230000-0x000000000627C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4932-155-0x0000000005BF0000-0x0000000005F47000-memory.dmp

                              Filesize

                              3.3MB