Analysis
-
max time kernel
43s -
max time network
24s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2023, 11:36
Static task
static1
General
-
Target
129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe
-
Size
4.1MB
-
MD5
d28b429652a35501cdfaa6934d627135
-
SHA1
f464e9d09675f9daee83d5e542a4511fa7edc87f
-
SHA256
129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f
-
SHA512
1f96f30a4f501583c00a623600e14fe0ff7ad18a504120f183367ba703b6159b9b6176e5cbb5048b7d786561fe7e5f8fc7c62773d99a781bbbc95f62dd89bdb6
-
SSDEEP
98304:fc0e3+aCj+36l5XW/GGCLh2mAzcPbvxZt6AKLzu8iOT:fcd3xCjPlFyGfoDz8DxZtHKHLfT
Malware Config
Signatures
-
Glupteba payload 9 IoCs
resource yara_rule behavioral1/memory/3920-2-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral1/memory/3920-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3920-70-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3920-72-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral1/memory/3920-307-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4356-310-0x0000000002E20000-0x000000000370B000-memory.dmp family_glupteba behavioral1/memory/4356-311-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4356-414-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4356-813-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4480 netsh.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2460 powershell.exe 2460 powershell.exe 2460 powershell.exe 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 3856 powershell.exe 3856 powershell.exe 3856 powershell.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 5000 powershell.exe 5000 powershell.exe 5000 powershell.exe 1732 powershell.exe 1732 powershell.exe 1732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Token: SeImpersonatePrivilege 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe Token: SeDebugPrivilege 3856 powershell.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeDebugPrivilege 1732 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2460 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 72 PID 3920 wrote to memory of 2460 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 72 PID 3920 wrote to memory of 2460 3920 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 72 PID 4356 wrote to memory of 3856 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 77 PID 4356 wrote to memory of 3856 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 77 PID 4356 wrote to memory of 3856 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 77 PID 4356 wrote to memory of 3624 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 79 PID 4356 wrote to memory of 3624 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 79 PID 3624 wrote to memory of 4480 3624 cmd.exe 81 PID 3624 wrote to memory of 4480 3624 cmd.exe 81 PID 4356 wrote to memory of 5000 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 82 PID 4356 wrote to memory of 5000 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 82 PID 4356 wrote to memory of 5000 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 82 PID 4356 wrote to memory of 1732 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 84 PID 4356 wrote to memory of 1732 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 84 PID 4356 wrote to memory of 1732 4356 129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe"C:\Users\Admin\AppData\Local\Temp\129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe"C:\Users\Admin\AppData\Local\Temp\129f0ee3535eadcec70aed07cd960fd30a71b39ebb236efb553f630414595e7f.exe"2⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a68d3ad9c21a59f19e93e1dbd0e6b4e5
SHA144c88155890797cb1decdf4ea5fc63ae773266d6
SHA256298bc2eeb32845f40d241fb28734481839dbc6aab8029acfa18b239dc481716d
SHA51214723688ec03e0b4585b5394935f3ffe0e81a1019432da3b15984b4cdc21449ed5cf5137f922f98257337aa816232a85df7d9d6ebba163498d0ef2b424d6df66
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56fa69467a005581b699cfae6f65c6f07
SHA18576dd536b07f7187122aec53d98a7f96be891a4
SHA256735bde53ef9db1e55157b1764aeda78b7e0a051dd2db432b59a3490c99f5be1d
SHA512c55e39ef829de77cca243804fdabcc27992331e057077f6699b6b5531c3cc4ed9e8ae7c41409ebe60ee5fb977444b9ff72369cb5c24ca6108bd9c75830d78af7