Malware Analysis Report

2025-08-05 20:57

Sample ID 240404-wcvjwsea2s
Target 0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b
SHA256 0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b
Tags
glupteba discovery dropper evasion loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b

Threat Level: Known bad

The file 0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Manipulates WinMonFS driver.

Checks installed software on the system

Adds Run key to start application

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-04 17:47

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-04 17:47

Reported

2024-04-04 17:49

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-162 = "Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3808 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3808 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3808 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 4668 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\system32\cmd.exe
PID 1804 wrote to memory of 4668 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\system32\cmd.exe
PID 4668 wrote to memory of 4284 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4668 wrote to memory of 4284 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1804 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1804 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 1804 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 1804 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 2692 wrote to memory of 1988 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 1988 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 1988 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 4616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 4616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 4616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 2400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 2400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 2400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2692 wrote to memory of 2036 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2692 wrote to memory of 2036 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3864 wrote to memory of 3680 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3864 wrote to memory of 3680 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3864 wrote to memory of 3680 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3680 wrote to memory of 5084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3680 wrote to memory of 5084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3680 wrote to memory of 5084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 57.162.23.2.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 22f795cc-fc6c-4327-b814-98719292fc18.uuid.dumppage.org udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 server7.dumppage.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.111:443 server7.dumppage.org tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
NL 74.125.128.127:19302 stun2.l.google.com udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 127.128.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 111.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.111:443 server7.dumppage.org tcp
US 8.8.8.8:53 155.203.100.95.in-addr.arpa udp
US 8.8.8.8:53 139.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
BG 185.82.216.111:443 server7.dumppage.org tcp

Files

memory/3808-1-0x0000000004DB0000-0x00000000051B8000-memory.dmp

memory/3808-2-0x00000000051C0000-0x0000000005AAB000-memory.dmp

memory/3808-3-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/4704-4-0x0000000004490000-0x00000000044C6000-memory.dmp

memory/4704-5-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/4704-6-0x0000000004480000-0x0000000004490000-memory.dmp

memory/4704-7-0x0000000004480000-0x0000000004490000-memory.dmp

memory/4704-8-0x0000000004B00000-0x0000000005128000-memory.dmp

memory/4704-9-0x0000000004A60000-0x0000000004A82000-memory.dmp

memory/4704-10-0x00000000051E0000-0x0000000005246000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5kcnxga0.1zb.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4704-11-0x0000000005350000-0x00000000053B6000-memory.dmp

memory/4704-17-0x00000000054B0000-0x0000000005804000-memory.dmp

memory/4704-22-0x0000000005AD0000-0x0000000005AEE000-memory.dmp

memory/4704-23-0x0000000005B00000-0x0000000005B4C000-memory.dmp

memory/4704-24-0x0000000006050000-0x0000000006094000-memory.dmp

memory/4704-25-0x0000000006BE0000-0x0000000006C56000-memory.dmp

memory/4704-26-0x00000000072E0000-0x000000000795A000-memory.dmp

memory/4704-27-0x0000000006C80000-0x0000000006C9A000-memory.dmp

memory/4704-29-0x000000007F990000-0x000000007F9A0000-memory.dmp

memory/4704-28-0x0000000007040000-0x0000000007072000-memory.dmp

memory/4704-30-0x0000000070050000-0x000000007009C000-memory.dmp

memory/4704-31-0x0000000070790000-0x0000000070AE4000-memory.dmp

memory/4704-42-0x0000000004480000-0x0000000004490000-memory.dmp

memory/4704-41-0x0000000007080000-0x000000000709E000-memory.dmp

memory/4704-43-0x00000000070A0000-0x0000000007143000-memory.dmp

memory/4704-44-0x0000000007190000-0x000000000719A000-memory.dmp

memory/4704-45-0x0000000007960000-0x00000000079F6000-memory.dmp

memory/4704-46-0x00000000071A0000-0x00000000071B1000-memory.dmp

memory/4704-47-0x00000000071E0000-0x00000000071EE000-memory.dmp

memory/4704-48-0x0000000007200000-0x0000000007214000-memory.dmp

memory/4704-49-0x0000000007240000-0x000000000725A000-memory.dmp

memory/4704-50-0x0000000007230000-0x0000000007238000-memory.dmp

memory/4704-53-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/3808-55-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/3808-56-0x0000000004DB0000-0x00000000051B8000-memory.dmp

memory/3808-57-0x00000000051C0000-0x0000000005AAB000-memory.dmp

memory/1804-58-0x0000000004DC0000-0x00000000051C5000-memory.dmp

memory/1804-59-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/3824-60-0x0000000004C60000-0x0000000004C70000-memory.dmp

memory/3824-61-0x0000000004C60000-0x0000000004C70000-memory.dmp

memory/3824-62-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/3824-72-0x0000000005B20000-0x0000000005E74000-memory.dmp

memory/3824-74-0x0000000070050000-0x000000007009C000-memory.dmp

memory/3824-75-0x00000000707D0000-0x0000000070B24000-memory.dmp

memory/3824-73-0x000000007F110000-0x000000007F120000-memory.dmp

memory/3824-86-0x0000000004C60000-0x0000000004C70000-memory.dmp

memory/3824-85-0x0000000007340000-0x00000000073E3000-memory.dmp

memory/3824-87-0x0000000007670000-0x0000000007681000-memory.dmp

memory/3824-88-0x00000000076C0000-0x00000000076D4000-memory.dmp

memory/3824-91-0x00000000741B0000-0x0000000074960000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/2712-95-0x0000000002A20000-0x0000000002A30000-memory.dmp

memory/2712-94-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/2712-96-0x0000000002A20000-0x0000000002A30000-memory.dmp

memory/2712-106-0x0000000005BA0000-0x0000000005EF4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c6496c3c96084eac03007b7c8ad00233
SHA1 05acc66bbf7d5facca637accca9324355a412139
SHA256 4de7264f878dc568d4fbdc5e1574543de8cf1358dc2e413cea5c42cd3877b75e
SHA512 b6a1a3d1df0783bd96722b3510af6a1bdbd7ba21e3c84bbab94dbcb15bf037bfdc4aa823816170865c0afe75551d7c7564a4b4cfd56946eaa15274bb555b9617

memory/2712-108-0x000000007F180000-0x000000007F190000-memory.dmp

memory/2712-109-0x0000000070050000-0x000000007009C000-memory.dmp

memory/2712-110-0x00000000701D0000-0x0000000070524000-memory.dmp

memory/2712-120-0x0000000002A20000-0x0000000002A30000-memory.dmp

memory/2712-122-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/2412-123-0x00000000741B0000-0x0000000074960000-memory.dmp

memory/1804-124-0x0000000004DC0000-0x00000000051C5000-memory.dmp

memory/2412-125-0x0000000004960000-0x0000000004970000-memory.dmp

memory/2412-126-0x0000000004960000-0x0000000004970000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 4e58a56e510f9ba631e344e0c2572b6a
SHA1 00596abffd293ed18848cf51c7f26d3750e8bffa
SHA256 a2b9041d7fcb10f7c42e58ea467d3cc7ad248953b330177e542bb90272814b8b
SHA512 ea9f920bea646459c777c0456d16d85abdb139f23bf64635afc3aad8107d388900f257c6e5ed0bf979312a47d47e91d1eab2560162f9a0429da52fcb8139327c

memory/2412-138-0x00000000707D0000-0x0000000070B24000-memory.dmp

memory/2412-137-0x0000000070050000-0x000000007009C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 7cf0ca418867417181209b579e96d979
SHA1 a3c5ff7843aa17b8b1782fd9fc77b43d5676158a
SHA256 0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b
SHA512 52b073648564f332b9c10ffa4751c7dce169e2bfaacbd1f2c88036dd47119b0a254958072b090de9acc732ed60aba9952022bb47e49d243d4e95945be2f8dd46

memory/1804-156-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-159-0x0000000000400000-0x0000000002F43000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 afd7218f82ab101e3da86d2a5c7f1f5b
SHA1 b7ba628cc4e05b266a863af1021ab18076dc9edd
SHA256 77cb9e8853c4c4f3a01ee52da484d9660d54116c6ce29e076c124d885aac1e9b
SHA512 921ff8b501cb8653c5bc59c946120a05c11778d2f94ad9e6da686709cea7aa82f1b3c696344652dc137847a49ebe769d7d13751e4b9a69618c339f601340926a

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 33d073e5469455aa3f16824e4b469382
SHA1 5b8414cbefb2b338d2dbd9f23d4df12f84acad86
SHA256 4887ec3023847057f81e7f3b8f6d9c9d1a3f0ccc2282c99b10622baa470e4b37
SHA512 b767cbb0e19a15eb5afa57e45ff72edc8b57b4a118e0cbaa7b1ad6e8b9e90b89e33ee69242901104f280a0e7e0392b7ac38e908812b7d0a50e7e80fc49062698

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7d296705cbfa979ca439cadf6ef397d8
SHA1 6e2a9924e4805f176b2c558dc1c943e72e3a12e4
SHA256 cb684fb83a2019852faa1786917760c8388b5ea82fb75c732e021f342eb07c39
SHA512 053c247f17adc304f623212ac3404488057ed46babfeb66d19f892cc44d113d6ff595847f5ab6ce8a45cc7c14e97f0687b70b2ca4ffcc41af3796ad50726f869

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2692-258-0x0000000000400000-0x0000000002F43000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3864-268-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2692-270-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-273-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/3012-274-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2692-277-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-281-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/3012-282-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2692-285-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-289-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-293-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-297-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-301-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2692-305-0x0000000000400000-0x0000000002F43000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-04 17:47

Reported

2024-04-04 17:49

Platform

win11-20240221-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-627134735-902745853-4257352768-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-627134735-902745853-4257352768-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2040 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2040 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2040 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1380 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\system32\cmd.exe
PID 3040 wrote to memory of 1380 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\system32\cmd.exe
PID 1380 wrote to memory of 2300 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1380 wrote to memory of 2300 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3040 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 3040 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 3040 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe C:\Windows\rss\csrss.exe
PID 668 wrote to memory of 4180 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 4180 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 4180 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 5104 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 5104 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 5104 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 3064 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 3064 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 3064 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 668 wrote to memory of 2960 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 668 wrote to memory of 2960 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4628 wrote to memory of 4844 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4628 wrote to memory of 4844 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4628 wrote to memory of 4844 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4844 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4844 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4844 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe

"C:\Users\Admin\AppData\Local\Temp\0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 server13.dumppage.org udp
US 162.159.133.233:443 cdn.discordapp.com tcp
CH 172.217.210.127:19302 stun4.l.google.com udp
BG 185.82.216.111:443 server13.dumppage.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.111:443 server13.dumppage.org tcp
BG 185.82.216.111:443 server13.dumppage.org tcp

Files

memory/2040-1-0x0000000004FA0000-0x00000000053A1000-memory.dmp

memory/2040-2-0x00000000053B0000-0x0000000005C9B000-memory.dmp

memory/2040-3-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2820-5-0x0000000003230000-0x0000000003266000-memory.dmp

memory/2820-4-0x0000000074960000-0x0000000075111000-memory.dmp

memory/2820-6-0x0000000005360000-0x0000000005370000-memory.dmp

memory/2820-7-0x00000000059A0000-0x0000000005FCA000-memory.dmp

memory/2820-8-0x0000000005960000-0x0000000005982000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mbdcgm25.y5v.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2820-14-0x0000000006110000-0x0000000006176000-memory.dmp

memory/2820-18-0x00000000061F0000-0x0000000006256000-memory.dmp

memory/2820-19-0x0000000006410000-0x0000000006767000-memory.dmp

memory/2820-20-0x00000000063B0000-0x00000000063CE000-memory.dmp

memory/2820-21-0x0000000006CA0000-0x0000000006CEC000-memory.dmp

memory/2820-22-0x0000000006C40000-0x0000000006C86000-memory.dmp

memory/2820-23-0x0000000005360000-0x0000000005370000-memory.dmp

memory/2820-25-0x0000000007B30000-0x0000000007B64000-memory.dmp

memory/2820-26-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

memory/2820-27-0x0000000070C20000-0x0000000070F77000-memory.dmp

memory/2820-36-0x0000000007B70000-0x0000000007B8E000-memory.dmp

memory/2820-37-0x0000000007B90000-0x0000000007C34000-memory.dmp

memory/2820-38-0x000000007EF50000-0x000000007EF60000-memory.dmp

memory/2040-24-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/2820-39-0x0000000008300000-0x000000000897A000-memory.dmp

memory/2820-40-0x0000000007CC0000-0x0000000007CDA000-memory.dmp

memory/2820-41-0x0000000007D20000-0x0000000007D2A000-memory.dmp

memory/2820-42-0x0000000007E30000-0x0000000007EC6000-memory.dmp

memory/2820-43-0x0000000007D40000-0x0000000007D51000-memory.dmp

memory/2820-44-0x0000000007D90000-0x0000000007D9E000-memory.dmp

memory/2820-45-0x0000000007DA0000-0x0000000007DB5000-memory.dmp

memory/2820-46-0x0000000007DF0000-0x0000000007E0A000-memory.dmp

memory/2820-47-0x0000000007DE0000-0x0000000007DE8000-memory.dmp

memory/2820-50-0x0000000074960000-0x0000000075111000-memory.dmp

memory/2040-52-0x0000000004FA0000-0x00000000053A1000-memory.dmp

memory/2040-53-0x00000000053B0000-0x0000000005C9B000-memory.dmp

memory/2040-54-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/3040-56-0x0000000004CD0000-0x00000000050D2000-memory.dmp

memory/3040-57-0x00000000050E0000-0x00000000059CB000-memory.dmp

memory/3040-58-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/4676-59-0x0000000074960000-0x0000000075111000-memory.dmp

memory/4676-60-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/4676-61-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/4676-70-0x0000000005920000-0x0000000005C77000-memory.dmp

memory/3040-71-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/4676-72-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/4676-74-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

memory/4676-75-0x0000000070D70000-0x00000000710C7000-memory.dmp

memory/4676-84-0x00000000070B0000-0x0000000007154000-memory.dmp

memory/4676-85-0x00000000073B0000-0x00000000073C1000-memory.dmp

memory/4676-86-0x0000000007400000-0x0000000007415000-memory.dmp

memory/4676-89-0x0000000074960000-0x0000000075111000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/1496-91-0x0000000074960000-0x0000000075111000-memory.dmp

memory/1496-93-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

memory/1496-92-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

memory/3040-94-0x0000000004CD0000-0x00000000050D2000-memory.dmp

memory/1496-103-0x0000000005CE0000-0x0000000006037000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 49b80ffa139987e2ad7796c2a17c4b3d
SHA1 2416d46df4b03f743c27e1f91e757d91035ea1a7
SHA256 8468d54b65f1b868bf6379e2cd56d74573cb96c7588e801c1fba78308c38c4b2
SHA512 88d9a3a91c38be1e565e042f3e1170c32da5bb253d81e673d2f20e7c0eba3d57a901c1effbfd1e151fe2f85c47991577c7e2d22f585c5ac28d53c2202064ff56

memory/3040-105-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/1496-106-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

memory/1496-107-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

memory/1496-108-0x0000000070D50000-0x00000000710A7000-memory.dmp

memory/3040-117-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/1496-119-0x000000007F160000-0x000000007F170000-memory.dmp

memory/1496-121-0x0000000074960000-0x0000000075111000-memory.dmp

memory/4924-122-0x0000000074960000-0x0000000075111000-memory.dmp

memory/4924-123-0x0000000002C50000-0x0000000002C60000-memory.dmp

memory/4924-124-0x0000000002C50000-0x0000000002C60000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8b945a172ec6c121ae6a316db3e4cc85
SHA1 9475ab8a898a920a61f7a74eeb42f1ab60056d5d
SHA256 61d40a0fe2a446ab619d8eb42c59d77a9374b04b411e4e22969bc7b406ed77d2
SHA512 d50651062a6634f0a2ea2ca0c1ae6eba4f24114222c695b17fb52564bcc87a63e6b9259c78164c42979bbea6019472badb63bbe4e3a1e8f77b311e5423318380

memory/4924-134-0x0000000002C50000-0x0000000002C60000-memory.dmp

memory/4924-135-0x000000007F900000-0x000000007F910000-memory.dmp

memory/4924-136-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 7cf0ca418867417181209b579e96d979
SHA1 a3c5ff7843aa17b8b1782fd9fc77b43d5676158a
SHA256 0f465a479d5926ad685939658e4d7226e209d99cd5874b46fbd48dda36e49f1b
SHA512 52b073648564f332b9c10ffa4751c7dce169e2bfaacbd1f2c88036dd47119b0a254958072b090de9acc732ed60aba9952022bb47e49d243d4e95945be2f8dd46

memory/3040-151-0x0000000000400000-0x0000000002F43000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ef587fbbae19fa0b436d04b84e98940d
SHA1 d570934d1402c81201ab549ce2bac678b983e4e7
SHA256 2e7258e272eb4cff31245ab11b960c2db31ec5ebdaa469da009fb5fa84f6c05f
SHA512 2095b27ccfa214e4a7621e090b045aabaebf6fd96e47876e1d030808d7e6a4d9bc3a9b5df36c4f218cb472843a86de92b8d1a367170bb73d796e49f8b915f474

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f84173b010783fb0d7299c592f6d38bd
SHA1 30bca05d6a531156c7f7cf52eb97de7f7d79f8be
SHA256 f694ff6977144678af85d46535d65ea8d9144eef21bc0ac4143e627ccffbeab8
SHA512 edf5b7fd872cc89c34f04a721edfedc2e0025d9fb6d04a7ab0a9e1d4be8cc9f1191d6eb3c17f6c2e2cede19d7121d063a08bdaf9b763744adb8b7a9d296cba3b

memory/668-199-0x0000000000400000-0x0000000002F43000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 dcaf7111447ff8a8ceb411d8329a3aa2
SHA1 f8baa8291db79c66cb4c739feb04474d77fe549d
SHA256 c3dc4e8a88632ee086d66af6c22776f813050ab3e9bde5878989dc962e442dbd
SHA512 3542e4dbf23dec2fb4c302bf52bfcf7e8209e1ce4cc1d3ca9e0a699ec0f155322f0afa9d5d4bebca539216afabe65ad3519964730b0fbc4326b8f73ad4b485d5

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/668-251-0x0000000000400000-0x0000000002F43000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4628-259-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/668-260-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/252-262-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/668-263-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/668-266-0x0000000000400000-0x0000000002F43000-memory.dmp

memory/252-268-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/668-270-0x0000000000400000-0x0000000002F43000-memory.dmp