Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2024, 03:57 UTC

General

  • Target

    JaffaCakes118_b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11.exe

  • Size

    4.1MB

  • MD5

    4faadc2e2c6005aad706745a0c7b441a

  • SHA1

    2b545fd949598d0e170e015579d9bcac443660b0

  • SHA256

    b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11

  • SHA512

    075995047177fe3bcfa6646dba19c2d38fc7b69020abde7e996a24aaaa62a41764b665779877912a50b2d9d3e07f69282b982d81595ac316232dfc7af0b04518

  • SSDEEP

    98304:7lnR1+rjwn6bULKE5r5OUAd9rzj+g6uMDV5rVXchsFvWfbwWlRHIhqxbA1W3uVi:BnEwn6EfwdlzjX6uMDV5pXKvwWRo8xbl

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 20 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4760
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2484
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4952
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2760
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:840
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 824
          3⤵
          • Program crash
          PID:2260
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 924 -ip 924
      1⤵
        PID:3260

      Network

      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        68.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        68.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        0c51e9ce-7ee1-4857-88d1-89ffad9a2f95.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        0c51e9ce-7ee1-4857-88d1-89ffad9a2f95.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        IN TXT
        Response
      • flag-us
        DNS
        228.249.119.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        228.249.119.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        stun.sipgate.net
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        stun.sipgate.net
        IN A
        Response
        stun.sipgate.net
        IN CNAME
        stun.sipgate.cloud
        stun.sipgate.cloud
        IN CNAME
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        IN A
        15.197.250.192
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        IN A
        3.33.249.248
      • flag-us
        DNS
        cdn.discordapp.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        cdn.discordapp.com
        IN A
        Response
        cdn.discordapp.com
        IN A
        162.159.129.233
        cdn.discordapp.com
        IN A
        162.159.133.233
        cdn.discordapp.com
        IN A
        162.159.135.233
        cdn.discordapp.com
        IN A
        162.159.130.233
        cdn.discordapp.com
        IN A
        162.159.134.233
      • flag-us
        DNS
        192.250.197.15.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        192.250.197.15.in-addr.arpa
        IN PTR
        Response
        192.250.197.15.in-addr.arpa
        IN PTR
        a6adcb4b9bf816abeawsglobalacceleratorcom
      • flag-us
        DNS
        233.129.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.129.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        53.210.109.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        53.210.109.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.42.69.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.42.69.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        88.210.23.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        88.210.23.2.in-addr.arpa
        IN PTR
        Response
        88.210.23.2.in-addr.arpa
        IN PTR
        a2-23-210-88deploystaticakamaitechnologiescom
      • flag-us
        DNS
        blockstream.info
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        blockstream.info
        IN A
        Response
        blockstream.info
        IN A
        34.36.36.12
      • flag-us
        DNS
        12.36.36.34.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        12.36.36.34.in-addr.arpa
        IN PTR
        Response
        12.36.36.34.in-addr.arpa
        IN PTR
        12363634bcgoogleusercontentcom
      • flag-us
        DNS
        13.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        22.49.80.91.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        22.49.80.91.in-addr.arpa
        IN PTR
        Response
      • 162.159.129.233:443
        cdn.discordapp.com
        tls
        csrss.exe
        1.3kB
        6.3kB
        15
        18
      • 127.0.0.1:31464
        csrss.exe
      • 127.0.0.1:31464
        csrss.exe
      • 127.0.0.1:31464
        csrss.exe
      • 34.36.36.12:443
        blockstream.info
        tls
        csrss.exe
        1.5kB
        14.2kB
        19
        24
      • 127.0.0.1:31465
        csrss.exe
      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        68.159.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        68.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        0c51e9ce-7ee1-4857-88d1-89ffad9a2f95.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        dns
        csrss.exe
        150 B
        225 B
        1
        1

        DNS Request

        0c51e9ce-7ee1-4857-88d1-89ffad9a2f95.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion

      • 8.8.8.8:53
        228.249.119.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        228.249.119.40.in-addr.arpa

      • 8.8.8.8:53
        stun.sipgate.net
        dns
        csrss.exe
        62 B
        182 B
        1
        1

        DNS Request

        stun.sipgate.net

        DNS Response

        15.197.250.192
        3.33.249.248

      • 8.8.8.8:53
        cdn.discordapp.com
        dns
        csrss.exe
        64 B
        144 B
        1
        1

        DNS Request

        cdn.discordapp.com

        DNS Response

        162.159.129.233
        162.159.133.233
        162.159.135.233
        162.159.130.233
        162.159.134.233

      • 15.197.250.192:3478
        stun.sipgate.net
        csrss.exe
        48 B
        124 B
        1
        1
      • 8.8.8.8:53
        192.250.197.15.in-addr.arpa
        dns
        73 B
        129 B
        1
        1

        DNS Request

        192.250.197.15.in-addr.arpa

      • 8.8.8.8:53
        233.129.159.162.in-addr.arpa
        dns
        74 B
        136 B
        1
        1

        DNS Request

        233.129.159.162.in-addr.arpa

      • 8.8.8.8:53
        53.210.109.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        53.210.109.20.in-addr.arpa

      • 8.8.8.8:53
        241.42.69.40.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        241.42.69.40.in-addr.arpa

      • 8.8.8.8:53
        88.210.23.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        88.210.23.2.in-addr.arpa

      • 8.8.8.8:53
        blockstream.info
        dns
        csrss.exe
        62 B
        78 B
        1
        1

        DNS Request

        blockstream.info

        DNS Response

        34.36.36.12

      • 8.8.8.8:53
        12.36.36.34.in-addr.arpa
        dns
        70 B
        120 B
        1
        1

        DNS Request

        12.36.36.34.in-addr.arpa

      • 8.8.8.8:53
        13.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        13.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        22.49.80.91.in-addr.arpa
        dns
        70 B
        145 B
        1
        1

        DNS Request

        22.49.80.91.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\rss\csrss.exe

        Filesize

        4.1MB

        MD5

        4faadc2e2c6005aad706745a0c7b441a

        SHA1

        2b545fd949598d0e170e015579d9bcac443660b0

        SHA256

        b53797848eec7786a638501252236e9b6b83da5a373f0d46274696660690ac11

        SHA512

        075995047177fe3bcfa6646dba19c2d38fc7b69020abde7e996a24aaaa62a41764b665779877912a50b2d9d3e07f69282b982d81595ac316232dfc7af0b04518

      • memory/924-7-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/924-8-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/924-13-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1656-1-0x0000000002AF0000-0x0000000002EE7000-memory.dmp

        Filesize

        4.0MB

      • memory/1656-2-0x0000000002EF0000-0x0000000003767000-memory.dmp

        Filesize

        8.5MB

      • memory/1656-3-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1656-5-0x0000000002EF0000-0x0000000003767000-memory.dmp

        Filesize

        8.5MB

      • memory/1656-4-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-22-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-27-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-20-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-23-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-24-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-25-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-26-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-21-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-28-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-29-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-30-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-31-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-32-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/4744-33-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.