Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2024, 21:10

General

  • Target

    87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e.exe

  • Size

    4.1MB

  • MD5

    d7885c69b557d8c5dcfdbd7f5a4e7bc6

  • SHA1

    bc739ec02626a63f369d4deee48e2217dfe378f6

  • SHA256

    87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e

  • SHA512

    2eeeac574b304388884d43188a0a3266c42c902992001e384a020a2891e37e61b46cfdd887ae7ad27a10de537ed2eb231f3971ca92c8e5c9fc9e5e2f7a6d8586

  • SSDEEP

    98304:7mSOHuT7egJLhRTCVEkOCdqjiWtSbuAFmh92I:70ObLh9WfG/tSdeT

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 15 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e.exe
    "C:\Users\Admin\AppData\Local\Temp\87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e.exe
      "C:\Users\Admin\AppData\Local\Temp\87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e.exe"
      2⤵
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:888
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4324
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4308
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        PID:3016
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
          PID:4756
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Command and Scripting Interpreter: PowerShell
            PID:2380
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:1408
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            4⤵
              PID:884
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Command and Scripting Interpreter: PowerShell
              PID:3972
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Command and Scripting Interpreter: PowerShell
              PID:564
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              4⤵
                PID:4848
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2228 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:548

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ygcaf1ro.cmk.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            f564e3ae3749e8c34d6d4ad7fce99961

            SHA1

            3266c541fc1bf16ad44fe6404a25edd7ce959e6a

            SHA256

            800b731e1582b877b10cb8134953b0f6985c70211b4e798b64137443274713b5

            SHA512

            227f4c7ec0dc98f61692c75c6b00f27204d7a3350d99a2bef1010355872fee38aee72808b15781f031403a1d03c02182109ae428f4eaf3e26b978e40f3752e90

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            f21fd2b6228fa9012c2f3e81ecbc43c5

            SHA1

            107af3fda9f54bfc6f6d843fa2eaa2c5073ef9fb

            SHA256

            9754268ed898f82a823adf4e21011de67a3d17793e2d04e15361d277b17ecea4

            SHA512

            ca43edb6d2834143f472d897e8c57c3cdedd2838842369b7c7770fefb6505978ef01b658f4fceb04656d92ff29545c8927807f08d934c3796115868f8cbf719b

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            64a50d5c9ca8cf3e9cd5c98db00e55a4

            SHA1

            3bd5b07901bc82a923396dd428848de1b579c148

            SHA256

            63a499424a24667384fdfc93ca0a3d8ad6b24b07a3f5e588a3b78db17aff70fd

            SHA512

            0b508eee7a3a14cb7617004d83fc26ed99bb9d5de008d7badb2a03b9397f655ad14d82207f80a5f25e9077cd4651fdf1009728133ae0f17524ed44950d83e22b

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            a3ba312b6a4c4f40f0ba0c28bc1a3666

            SHA1

            836a1025c79ca2bd7dba2306fee09af286679a6d

            SHA256

            931136e664c8d6f1208b939114429f5c56525e439f5363bf0650b40e68b7ebb0

            SHA512

            e957c371411a2eebe9b8c353dac06fec442ea0b7eaaa4a4b48a6aea21fc9528eb82c710999e81958d0b085bbdfe23dcb506bdc7f2d0d71bd470ecb58e8dd5e9e

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            2bf8e2455175377be819d0dfb7d6835a

            SHA1

            3bcfb9d68e7735a410836a79c9a306840904c9a7

            SHA256

            513df0837fc73233b189c3a3df67c74ee3ce1112cf00471e780488d639889e11

            SHA512

            983ebbcc1e5df7a084890fc96aa68b75aa383ec0aba29a5310e216583e5bd4df825216e4cb280833bed8ca8cecda4f8418b500c5f1cbb33b88d49747bd5207df

          • C:\Windows\rss\csrss.exe

            Filesize

            4.1MB

            MD5

            d7885c69b557d8c5dcfdbd7f5a4e7bc6

            SHA1

            bc739ec02626a63f369d4deee48e2217dfe378f6

            SHA256

            87ccc691911c412b7867ab19e724c60adfcc1273a914be8badd7378c7faaca5e

            SHA512

            2eeeac574b304388884d43188a0a3266c42c902992001e384a020a2891e37e61b46cfdd887ae7ad27a10de537ed2eb231f3971ca92c8e5c9fc9e5e2f7a6d8586

          • memory/564-216-0x0000000070330000-0x0000000070684000-memory.dmp

            Filesize

            3.3MB

          • memory/564-215-0x00000000701B0000-0x00000000701FC000-memory.dmp

            Filesize

            304KB

          • memory/888-94-0x0000000007B80000-0x0000000007B94000-memory.dmp

            Filesize

            80KB

          • memory/888-91-0x0000000007800000-0x00000000078A3000-memory.dmp

            Filesize

            652KB

          • memory/888-80-0x0000000070410000-0x0000000070764000-memory.dmp

            Filesize

            3.3MB

          • memory/888-92-0x0000000007B30000-0x0000000007B41000-memory.dmp

            Filesize

            68KB

          • memory/888-79-0x0000000070290000-0x00000000702DC000-memory.dmp

            Filesize

            304KB

          • memory/888-78-0x0000000006160000-0x00000000064B4000-memory.dmp

            Filesize

            3.3MB

          • memory/2380-165-0x0000000070410000-0x0000000070764000-memory.dmp

            Filesize

            3.3MB

          • memory/2380-164-0x0000000070290000-0x00000000702DC000-memory.dmp

            Filesize

            304KB

          • memory/2680-45-0x0000000070850000-0x0000000070BA4000-memory.dmp

            Filesize

            3.3MB

          • memory/2680-35-0x0000000006A40000-0x0000000006A8C000-memory.dmp

            Filesize

            304KB

          • memory/2680-38-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-39-0x0000000007C80000-0x0000000007CF6000-memory.dmp

            Filesize

            472KB

          • memory/2680-40-0x0000000008400000-0x0000000008A7A000-memory.dmp

            Filesize

            6.5MB

          • memory/2680-41-0x0000000007DA0000-0x0000000007DBA000-memory.dmp

            Filesize

            104KB

          • memory/2680-43-0x0000000007F80000-0x0000000007FB2000-memory.dmp

            Filesize

            200KB

          • memory/2680-44-0x0000000070290000-0x00000000702DC000-memory.dmp

            Filesize

            304KB

          • memory/2680-42-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-11-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-55-0x0000000007F60000-0x0000000007F7E000-memory.dmp

            Filesize

            120KB

          • memory/2680-56-0x0000000007FC0000-0x0000000008063000-memory.dmp

            Filesize

            652KB

          • memory/2680-57-0x00000000080B0000-0x00000000080BA000-memory.dmp

            Filesize

            40KB

          • memory/2680-58-0x0000000008170000-0x0000000008206000-memory.dmp

            Filesize

            600KB

          • memory/2680-59-0x00000000080D0000-0x00000000080E1000-memory.dmp

            Filesize

            68KB

          • memory/2680-60-0x0000000008110000-0x000000000811E000-memory.dmp

            Filesize

            56KB

          • memory/2680-61-0x0000000008120000-0x0000000008134000-memory.dmp

            Filesize

            80KB

          • memory/2680-62-0x0000000008210000-0x000000000822A000-memory.dmp

            Filesize

            104KB

          • memory/2680-63-0x0000000008150000-0x0000000008158000-memory.dmp

            Filesize

            32KB

          • memory/2680-36-0x0000000006F90000-0x0000000006FD4000-memory.dmp

            Filesize

            272KB

          • memory/2680-34-0x0000000006960000-0x000000000697E000-memory.dmp

            Filesize

            120KB

          • memory/2680-9-0x00000000743FE000-0x00000000743FF000-memory.dmp

            Filesize

            4KB

          • memory/2680-33-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-12-0x0000000003340000-0x0000000003376000-memory.dmp

            Filesize

            216KB

          • memory/2680-67-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-32-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-28-0x00000000063A0000-0x00000000066F4000-memory.dmp

            Filesize

            3.3MB

          • memory/2680-20-0x0000000006330000-0x0000000006396000-memory.dmp

            Filesize

            408KB

          • memory/2680-19-0x0000000005B20000-0x0000000005B86000-memory.dmp

            Filesize

            408KB

          • memory/2680-18-0x0000000005880000-0x00000000058A2000-memory.dmp

            Filesize

            136KB

          • memory/2680-17-0x00000000743FE000-0x00000000743FF000-memory.dmp

            Filesize

            4KB

          • memory/2680-14-0x00000000743F0000-0x0000000074BA0000-memory.dmp

            Filesize

            7.7MB

          • memory/2680-15-0x0000000005D00000-0x0000000006328000-memory.dmp

            Filesize

            6.2MB

          • memory/2892-93-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2892-146-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2892-151-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2892-121-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-8-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/2992-6-0x0000000004660000-0x0000000004A61000-memory.dmp

            Filesize

            4.0MB

          • memory/2992-1-0x0000000004660000-0x0000000004A61000-memory.dmp

            Filesize

            4.0MB

          • memory/2992-2-0x0000000004A70000-0x000000000535B000-memory.dmp

            Filesize

            8.9MB

          • memory/2992-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/2992-4-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-5-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-90-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-64-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-10-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/2992-7-0x0000000004A70000-0x000000000535B000-memory.dmp

            Filesize

            8.9MB

          • memory/3016-135-0x0000000070430000-0x0000000070784000-memory.dmp

            Filesize

            3.3MB

          • memory/3016-132-0x0000000005F30000-0x0000000006284000-memory.dmp

            Filesize

            3.3MB

          • memory/3016-134-0x0000000070290000-0x00000000702DC000-memory.dmp

            Filesize

            304KB

          • memory/3972-200-0x00000000072E0000-0x0000000007383000-memory.dmp

            Filesize

            652KB

          • memory/3972-189-0x00000000701B0000-0x00000000701FC000-memory.dmp

            Filesize

            304KB

          • memory/3972-190-0x0000000070330000-0x0000000070684000-memory.dmp

            Filesize

            3.3MB

          • memory/3972-201-0x0000000007650000-0x0000000007661000-memory.dmp

            Filesize

            68KB

          • memory/3972-203-0x00000000059D0000-0x00000000059E4000-memory.dmp

            Filesize

            80KB

          • memory/3972-188-0x0000000006100000-0x000000000614C000-memory.dmp

            Filesize

            304KB

          • memory/3972-186-0x0000000005B80000-0x0000000005ED4000-memory.dmp

            Filesize

            3.3MB

          • memory/4308-104-0x00000000056D0000-0x0000000005A24000-memory.dmp

            Filesize

            3.3MB

          • memory/4308-111-0x0000000070A30000-0x0000000070D84000-memory.dmp

            Filesize

            3.3MB

          • memory/4308-110-0x0000000070290000-0x00000000702DC000-memory.dmp

            Filesize

            304KB

          • memory/4756-202-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB

          • memory/4756-233-0x0000000000400000-0x0000000002738000-memory.dmp

            Filesize

            35.2MB