Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 10:15

General

  • Target

    f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1.exe

  • Size

    4.1MB

  • MD5

    64205290b5d5fb08308f23ecd621e401

  • SHA1

    f89e93cbad277071230f37909b6c93393aa53d67

  • SHA256

    f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1

  • SHA512

    1127ffeafedc28563fca9b9719b77bd201c075cacf302c37a302c15582635deb1e092857090caba577432d3e1d3fd3187ddbe9c08771e1932952179845e1263a

  • SSDEEP

    98304:/nLDm1XoLdMR8t8Rupb9uumF9S8JB25VPPQ2VTa74pIHCaet:/fE4ht8Q1UumFLAPQ2VTFpIiaw

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1.exe
    "C:\Users\Admin\AppData\Local\Temp\f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:408
    • C:\Users\Admin\AppData\Local\Temp\f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1.exe
      "C:\Users\Admin\AppData\Local\Temp\f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3432
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3704
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4828
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4692
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:5100
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4340 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4932

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yhzej3ux.bg3.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          afc2b03ecb8991ca301a6d8d6a8d8074

          SHA1

          2f985f3cc62e619ad6dccb9347cadf10bc735c99

          SHA256

          d26edf165d010f1b783e4f32845095cde6f8c84fe7bd2d7952a06db431d4ff78

          SHA512

          9a0901331ad64d29a9240a2722850f58f4f0b409dd80620127ebd9e7098dd582eb90a77b077db125b52c6eb77ee77525444ae2f24fe81e024bd8f924a433247e

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          5cf87f0c3eceb06c396867cb5b9c517f

          SHA1

          9b1813d89991c64a81cffcae952983f09c6f6f66

          SHA256

          43e65fae8e397101cd434470dc98c0445f55391cdb8167bffa5d3546d9592999

          SHA512

          ef56c9247e121f8784e10fffb6d8b88e08ce0f634da784a1fe30254ac171ddf2a003e5f1a768d15c0bb26d475afaa3ef2bac213b89f7e4ddc2406347765678e4

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          d5243a8b64e8f09f6f1935f28bac6bbb

          SHA1

          4d25eeca9e323985d6c02eada817af2bca6809e0

          SHA256

          562d625bc6620b6f216761702a5ec9664ffab63dabe3b9fb39eb22c9dcc7bf12

          SHA512

          e7a774c832fc2465f103ba32f4f8cb17616772602e77d45e1f1123b98919e74d766547759e5fdcede222c3be7dbe2909582ce76564639772fa73499fe7a99771

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          9492f8655cfcd3333c2ca3c0b25590ce

          SHA1

          65563c52b564e10651d59c68254fc0a209484241

          SHA256

          7dea854d695e6088a747742dc40a29b6b11b559f5735248b3739b2b13a3f78a3

          SHA512

          e6a194fbe297cd3ca25c6751daff1ede61230ea0da58460e8bf13d03fccbc9d54bc97fcb8fddb765c28150ab3ad93353b3c6db7bcf61c25e95bd84e72f27e0e6

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          20ea7e9161b09b6de216427520c4c20d

          SHA1

          81398efc975456fb81cfd05e9e9e39e35cbeab38

          SHA256

          01d31574bf25c927bc5a0abe9932509cae5231997d9ee6dddadd119c7486c649

          SHA512

          ed6f7725bb678a84a9b3006d4a8dc5ba62fe6b7bd625b840f4fcfd9d6629853a15af0bb6968252ad42f58d13fa5dd146749b1af5208b305fdc6db831587fa3af

        • C:\Windows\rss\csrss.exe

          Filesize

          4.1MB

          MD5

          64205290b5d5fb08308f23ecd621e401

          SHA1

          f89e93cbad277071230f37909b6c93393aa53d67

          SHA256

          f90afa4d4b5033eab5c2d92ae26f7ae12bb705d5f19fb54b45efd495f080f6b1

          SHA512

          1127ffeafedc28563fca9b9719b77bd201c075cacf302c37a302c15582635deb1e092857090caba577432d3e1d3fd3187ddbe9c08771e1932952179845e1263a

        • memory/408-57-0x0000000074A00000-0x00000000751B0000-memory.dmp

          Filesize

          7.7MB

        • memory/408-7-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

          Filesize

          64KB

        • memory/408-4-0x0000000074A00000-0x00000000751B0000-memory.dmp

          Filesize

          7.7MB

        • memory/408-12-0x0000000006220000-0x0000000006286000-memory.dmp

          Filesize

          408KB

        • memory/408-10-0x00000000058F0000-0x0000000005912000-memory.dmp

          Filesize

          136KB

        • memory/408-18-0x00000000062D0000-0x0000000006624000-memory.dmp

          Filesize

          3.3MB

        • memory/408-23-0x0000000006990000-0x00000000069AE000-memory.dmp

          Filesize

          120KB

        • memory/408-24-0x00000000069C0000-0x0000000006A0C000-memory.dmp

          Filesize

          304KB

        • memory/408-25-0x0000000006E50000-0x0000000006E94000-memory.dmp

          Filesize

          272KB

        • memory/408-26-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

          Filesize

          64KB

        • memory/408-27-0x0000000007C30000-0x0000000007CA6000-memory.dmp

          Filesize

          472KB

        • memory/408-28-0x0000000008330000-0x00000000089AA000-memory.dmp

          Filesize

          6.5MB

        • memory/408-29-0x0000000007CD0000-0x0000000007CEA000-memory.dmp

          Filesize

          104KB

        • memory/408-31-0x0000000007E80000-0x0000000007EB2000-memory.dmp

          Filesize

          200KB

        • memory/408-6-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

          Filesize

          64KB

        • memory/408-33-0x000000007FC00000-0x000000007FC10000-memory.dmp

          Filesize

          64KB

        • memory/408-32-0x00000000708A0000-0x00000000708EC000-memory.dmp

          Filesize

          304KB

        • memory/408-34-0x0000000070C90000-0x0000000070FE4000-memory.dmp

          Filesize

          3.3MB

        • memory/408-44-0x0000000007E60000-0x0000000007E7E000-memory.dmp

          Filesize

          120KB

        • memory/408-45-0x0000000007EC0000-0x0000000007F63000-memory.dmp

          Filesize

          652KB

        • memory/408-46-0x0000000007FD0000-0x0000000007FDA000-memory.dmp

          Filesize

          40KB

        • memory/408-47-0x0000000008090000-0x0000000008126000-memory.dmp

          Filesize

          600KB

        • memory/408-48-0x0000000007FF0000-0x0000000008001000-memory.dmp

          Filesize

          68KB

        • memory/408-49-0x0000000008030000-0x000000000803E000-memory.dmp

          Filesize

          56KB

        • memory/408-50-0x0000000008040000-0x0000000008054000-memory.dmp

          Filesize

          80KB

        • memory/408-5-0x0000000003360000-0x0000000003396000-memory.dmp

          Filesize

          216KB

        • memory/408-53-0x0000000008130000-0x000000000814A000-memory.dmp

          Filesize

          104KB

        • memory/408-54-0x0000000008070000-0x0000000008078000-memory.dmp

          Filesize

          32KB

        • memory/408-8-0x0000000005B80000-0x00000000061A8000-memory.dmp

          Filesize

          6.2MB

        • memory/408-11-0x0000000005A10000-0x0000000005A76000-memory.dmp

          Filesize

          408KB

        • memory/2616-159-0x0000000006420000-0x0000000006774000-memory.dmp

          Filesize

          3.3MB

        • memory/2616-161-0x00000000708A0000-0x00000000708EC000-memory.dmp

          Filesize

          304KB

        • memory/2616-162-0x0000000070A20000-0x0000000070D74000-memory.dmp

          Filesize

          3.3MB

        • memory/3012-197-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/3432-104-0x0000000070C70000-0x0000000070FC4000-memory.dmp

          Filesize

          3.3MB

        • memory/3432-103-0x00000000708A0000-0x00000000708EC000-memory.dmp

          Filesize

          304KB

        • memory/3432-101-0x0000000006000000-0x0000000006354000-memory.dmp

          Filesize

          3.3MB

        • memory/4640-74-0x0000000071020000-0x0000000071374000-memory.dmp

          Filesize

          3.3MB

        • memory/4640-68-0x0000000005800000-0x0000000005B54000-memory.dmp

          Filesize

          3.3MB

        • memory/4640-86-0x00000000073A0000-0x00000000073B4000-memory.dmp

          Filesize

          80KB

        • memory/4640-85-0x0000000007350000-0x0000000007361000-memory.dmp

          Filesize

          68KB

        • memory/4640-73-0x00000000708A0000-0x00000000708EC000-memory.dmp

          Filesize

          304KB

        • memory/4640-84-0x0000000007040000-0x00000000070E3000-memory.dmp

          Filesize

          652KB

        • memory/4672-138-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4672-62-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4672-143-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4672-91-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4692-179-0x0000000006320000-0x0000000006674000-memory.dmp

          Filesize

          3.3MB

        • memory/4692-200-0x00000000067A0000-0x00000000067B4000-memory.dmp

          Filesize

          80KB

        • memory/4692-199-0x0000000007F10000-0x0000000007F21000-memory.dmp

          Filesize

          68KB

        • memory/4692-198-0x0000000007C20000-0x0000000007CC3000-memory.dmp

          Filesize

          652KB

        • memory/4692-187-0x0000000070F50000-0x00000000712A4000-memory.dmp

          Filesize

          3.3MB

        • memory/4692-186-0x00000000707C0000-0x000000007080C000-memory.dmp

          Filesize

          304KB

        • memory/4692-185-0x0000000006D70000-0x0000000006DBC000-memory.dmp

          Filesize

          304KB

        • memory/4888-9-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4888-1-0x0000000003550000-0x0000000003955000-memory.dmp

          Filesize

          4.0MB

        • memory/4888-3-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4888-30-0x0000000003550000-0x0000000003955000-memory.dmp

          Filesize

          4.0MB

        • memory/4888-52-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4888-59-0x0000000000400000-0x0000000002ED6000-memory.dmp

          Filesize

          42.8MB

        • memory/4888-51-0x0000000005100000-0x00000000059EB000-memory.dmp

          Filesize

          8.9MB

        • memory/4888-2-0x0000000005100000-0x00000000059EB000-memory.dmp

          Filesize

          8.9MB

        • memory/5100-120-0x0000000005A30000-0x0000000005D84000-memory.dmp

          Filesize

          3.3MB

        • memory/5100-127-0x0000000071000000-0x0000000071354000-memory.dmp

          Filesize

          3.3MB

        • memory/5100-126-0x00000000708A0000-0x00000000708EC000-memory.dmp

          Filesize

          304KB

        • memory/5100-211-0x0000000005E20000-0x0000000006174000-memory.dmp

          Filesize

          3.3MB