Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2024, 06:21 UTC

General

  • Target

    JaffaCakes118_72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610.exe

  • Size

    4.1MB

  • MD5

    4d3c6e4ea5b9672309328788de213ac0

  • SHA1

    3a7dd42184ef8f91da5926a2e6dcc4135e8bee73

  • SHA256

    72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610

  • SHA512

    0b68735a4b923b0e1d8efc12e8d26a7784a054678613d010ce235d7e0360fe6bf8a5b382f952e74c37d2c204582d99a0d19446b30d9c2f99a0c977c64c05a04a

  • SSDEEP

    98304:RgqCBZX4jKsUxGcJJmYgCiYj3cXN5JCPhZ/9Z4xnoc0:utHpxGcaADjMXN+PLH4z0

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3720
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2800
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1252
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4744
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:5052
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 880
          3⤵
          • Program crash
          PID:4708
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1612 -ip 1612
      1⤵
        PID:4928

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        88.210.23.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        88.210.23.2.in-addr.arpa
        IN PTR
        Response
        88.210.23.2.in-addr.arpa
        IN PTR
        a2-23-210-88deploystaticakamaitechnologiescom
      • flag-us
        DNS
        2.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        2.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        196.249.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        196.249.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        f660cd11-b1df-4a73-b89d-6d89e1a2e8b5.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        f660cd11-b1df-4a73-b89d-6d89e1a2e8b5.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        IN TXT
        Response
      • flag-us
        DNS
        stun2.l.google.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        stun2.l.google.com
        IN A
        Response
        stun2.l.google.com
        IN A
        74.125.250.129
      • flag-us
        DNS
        cdn.discordapp.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        cdn.discordapp.com
        IN A
        Response
        cdn.discordapp.com
        IN A
        162.159.130.233
        cdn.discordapp.com
        IN A
        162.159.135.233
        cdn.discordapp.com
        IN A
        162.159.133.233
        cdn.discordapp.com
        IN A
        162.159.134.233
        cdn.discordapp.com
        IN A
        162.159.129.233
      • flag-us
        DNS
        129.250.125.74.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        129.250.125.74.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        233.130.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.130.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        50.23.12.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        50.23.12.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.42.69.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.42.69.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        30.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        30.243.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        blockstream.info
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        blockstream.info
        IN A
        Response
        blockstream.info
        IN A
        34.36.36.12
      • flag-us
        DNS
        12.36.36.34.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        12.36.36.34.in-addr.arpa
        IN PTR
        Response
        12.36.36.34.in-addr.arpa
        IN PTR
        12363634bcgoogleusercontentcom
      • 127.0.0.1:31464
        csrss.exe
      • 162.159.130.233:443
        cdn.discordapp.com
        tls
        csrss.exe
        1.5kB
        6.3kB
        18
        20
      • 127.0.0.1:31464
        csrss.exe
      • 127.0.0.1:31464
        csrss.exe
      • 34.36.36.12:443
        blockstream.info
        tls
        csrss.exe
        1.6kB
        14.2kB
        19
        22
      • 127.0.0.1:31465
        csrss.exe
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        97.17.167.52.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        97.17.167.52.in-addr.arpa

      • 8.8.8.8:53
        88.210.23.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        88.210.23.2.in-addr.arpa

      • 8.8.8.8:53
        2.159.190.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        2.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        196.249.167.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        196.249.167.52.in-addr.arpa

      • 8.8.8.8:53
        f660cd11-b1df-4a73-b89d-6d89e1a2e8b5.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
        dns
        csrss.exe
        150 B
        225 B
        1
        1

        DNS Request

        f660cd11-b1df-4a73-b89d-6d89e1a2e8b5.uuid.dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion

      • 8.8.8.8:53
        stun2.l.google.com
        dns
        csrss.exe
        64 B
        80 B
        1
        1

        DNS Request

        stun2.l.google.com

        DNS Response

        74.125.250.129

      • 8.8.8.8:53
        cdn.discordapp.com
        dns
        csrss.exe
        64 B
        144 B
        1
        1

        DNS Request

        cdn.discordapp.com

        DNS Response

        162.159.130.233
        162.159.135.233
        162.159.133.233
        162.159.134.233
        162.159.129.233

      • 74.125.250.129:19302
        stun2.l.google.com
        csrss.exe
        48 B
        60 B
        1
        1
      • 8.8.8.8:53
        129.250.125.74.in-addr.arpa
        dns
        73 B
        133 B
        1
        1

        DNS Request

        129.250.125.74.in-addr.arpa

      • 8.8.8.8:53
        233.130.159.162.in-addr.arpa
        dns
        74 B
        136 B
        1
        1

        DNS Request

        233.130.159.162.in-addr.arpa

      • 8.8.8.8:53
        50.23.12.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        50.23.12.20.in-addr.arpa

      • 8.8.8.8:53
        241.42.69.40.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        241.42.69.40.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        30.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        30.243.111.52.in-addr.arpa

      • 8.8.8.8:53
        blockstream.info
        dns
        csrss.exe
        62 B
        78 B
        1
        1

        DNS Request

        blockstream.info

        DNS Response

        34.36.36.12

      • 8.8.8.8:53
        12.36.36.34.in-addr.arpa
        dns
        70 B
        120 B
        1
        1

        DNS Request

        12.36.36.34.in-addr.arpa

      • 8.8.8.8:53

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\rss\csrss.exe

        Filesize

        4.1MB

        MD5

        4d3c6e4ea5b9672309328788de213ac0

        SHA1

        3a7dd42184ef8f91da5926a2e6dcc4135e8bee73

        SHA256

        72fed10b7cc9fa24cd772e9498b284d8b8617e700a88f4eb0fa4265a94065610

        SHA512

        0b68735a4b923b0e1d8efc12e8d26a7784a054678613d010ce235d7e0360fe6bf8a5b382f952e74c37d2c204582d99a0d19446b30d9c2f99a0c977c64c05a04a

      • memory/1116-26-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-29-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-33-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-32-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-31-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-30-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-28-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-27-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-21-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-22-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-23-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-24-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1116-25-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1612-14-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1612-8-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/1612-7-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/3720-1-0x0000000002A30000-0x0000000002E27000-memory.dmp

        Filesize

        4.0MB

      • memory/3720-2-0x0000000002E30000-0x00000000036A6000-memory.dmp

        Filesize

        8.5MB

      • memory/3720-5-0x0000000002E30000-0x00000000036A6000-memory.dmp

        Filesize

        8.5MB

      • memory/3720-3-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      • memory/3720-4-0x0000000000400000-0x0000000000C91000-memory.dmp

        Filesize

        8.6MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.