Malware Analysis Report

2025-08-06 03:33

Sample ID 240419-wnlq5acc2v
Target e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27
SHA256 e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27
Tags
glupteba discovery dropper evasion loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27

Threat Level: Known bad

The file e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion loader persistence rootkit upx

Glupteba

Glupteba payload

Blocklisted process makes network request

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Adds Run key to start application

Manipulates WinMonFS driver.

Checks installed software on the system

Drops file in System32 directory

Drops file in Windows directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-19 18:04

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 18:04

Reported

2024-04-19 18:06

Platform

win10v2004-20240412-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1672 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1672 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1672 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\system32\cmd.exe
PID 1728 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\system32\cmd.exe
PID 4296 wrote to memory of 516 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4296 wrote to memory of 516 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1728 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 180 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 1728 wrote to memory of 180 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 1728 wrote to memory of 180 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 180 wrote to memory of 4852 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 4852 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 4852 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 1748 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 1748 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 1748 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 2280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 2280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 2280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 180 wrote to memory of 1968 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 180 wrote to memory of 1968 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2952 wrote to memory of 4916 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2952 wrote to memory of 4916 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2952 wrote to memory of 4916 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4916 wrote to memory of 3932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4916 wrote to memory of 3932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4916 wrote to memory of 3932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 156.33.209.4.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 6f74ef3c-f4ed-4c3d-9506-6bd272960b9f.uuid.statscreate.org udp
US 8.8.8.8:53 stun.sipgate.net udp
US 8.8.8.8:53 server3.statscreate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 3.33.249.248:3478 stun.sipgate.net udp
US 8.8.8.8:53 248.249.33.3.in-addr.arpa udp
BG 185.82.216.96:443 server3.statscreate.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
BG 185.82.216.96:443 server3.statscreate.org tcp
BG 185.82.216.96:443 server3.statscreate.org tcp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
BG 185.82.216.96:443 server3.statscreate.org tcp
N/A 127.0.0.1:31465 tcp

Files

memory/1672-1-0x0000000003D50000-0x0000000004156000-memory.dmp

memory/1672-2-0x0000000004160000-0x0000000004A4B000-memory.dmp

memory/1672-3-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2336-4-0x0000000002A30000-0x0000000002A66000-memory.dmp

memory/2336-5-0x00000000057C0000-0x0000000005DE8000-memory.dmp

memory/2336-6-0x0000000074C80000-0x0000000075430000-memory.dmp

memory/2336-7-0x00000000029D0000-0x00000000029E0000-memory.dmp

memory/2336-8-0x00000000029D0000-0x00000000029E0000-memory.dmp

memory/2336-9-0x00000000053B0000-0x00000000053D2000-memory.dmp

memory/2336-10-0x0000000005550000-0x00000000055B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ctffsbpi.psf.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2336-16-0x00000000056F0000-0x0000000005756000-memory.dmp

memory/2336-17-0x0000000005DF0000-0x0000000006144000-memory.dmp

memory/2336-22-0x0000000006370000-0x000000000638E000-memory.dmp

memory/2336-23-0x0000000006450000-0x000000000649C000-memory.dmp

memory/2336-24-0x00000000068C0000-0x0000000006904000-memory.dmp

memory/2336-25-0x00000000074A0000-0x0000000007516000-memory.dmp

memory/2336-27-0x0000000007750000-0x000000000776A000-memory.dmp

memory/2336-26-0x0000000007DD0000-0x000000000844A000-memory.dmp

memory/2336-30-0x0000000070B20000-0x0000000070B6C000-memory.dmp

memory/2336-31-0x00000000710D0000-0x0000000071424000-memory.dmp

memory/2336-29-0x00000000078F0000-0x0000000007922000-memory.dmp

memory/2336-42-0x00000000029D0000-0x00000000029E0000-memory.dmp

memory/2336-43-0x0000000007950000-0x00000000079F3000-memory.dmp

memory/2336-41-0x0000000007930000-0x000000000794E000-memory.dmp

memory/2336-28-0x000000007EF40000-0x000000007EF50000-memory.dmp

memory/2336-44-0x0000000007A40000-0x0000000007A4A000-memory.dmp

memory/2336-45-0x0000000007B00000-0x0000000007B96000-memory.dmp

memory/2336-46-0x0000000007A60000-0x0000000007A71000-memory.dmp

memory/2336-47-0x0000000007AA0000-0x0000000007AAE000-memory.dmp

memory/2336-48-0x0000000007AB0000-0x0000000007AC4000-memory.dmp

memory/2336-49-0x0000000007BA0000-0x0000000007BBA000-memory.dmp

memory/2336-50-0x0000000007AE0000-0x0000000007AE8000-memory.dmp

memory/2336-53-0x0000000074C80000-0x0000000075430000-memory.dmp

memory/1672-54-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/1672-57-0x0000000004160000-0x0000000004A4B000-memory.dmp

memory/1728-56-0x0000000003AB0000-0x0000000003EAF000-memory.dmp

memory/1728-58-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/5060-60-0x00000000049B0000-0x00000000049C0000-memory.dmp

memory/5060-61-0x00000000049B0000-0x00000000049C0000-memory.dmp

memory/5060-62-0x0000000005740000-0x0000000005A94000-memory.dmp

memory/5060-59-0x0000000074D20000-0x00000000754D0000-memory.dmp

memory/5060-72-0x0000000005DC0000-0x0000000005E0C000-memory.dmp

memory/5060-73-0x000000007EE40000-0x000000007EE50000-memory.dmp

memory/5060-75-0x00000000713C0000-0x0000000071714000-memory.dmp

memory/5060-74-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/5060-85-0x00000000049B0000-0x00000000049C0000-memory.dmp

memory/5060-86-0x0000000006F20000-0x0000000006FC3000-memory.dmp

memory/5060-87-0x0000000007250000-0x0000000007261000-memory.dmp

memory/5060-88-0x00000000072A0000-0x00000000072B4000-memory.dmp

memory/5060-91-0x0000000074D20000-0x00000000754D0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/756-93-0x0000000074D20000-0x00000000754D0000-memory.dmp

memory/756-95-0x0000000002910000-0x0000000002920000-memory.dmp

memory/756-94-0x0000000002910000-0x0000000002920000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5875385d7404bd62d959b94b6c997f22
SHA1 1386ebf7e397ad22a846dd9516b947f06f24d3b5
SHA256 0b9a14c2265f07ddb6f32d4fb27c44d756d88ba304fd24203ebdc4e754e29ebb
SHA512 22cf7e30e219f85654aff2a51abff177a096edf8c647c09f5ec4125a2d3e4f3ec8fdd80663c4463d077d8afe2c80e3dd53d916d493546acfaff8965f6beb0757

memory/756-118-0x0000000002910000-0x0000000002920000-memory.dmp

memory/756-108-0x00000000713C0000-0x0000000071714000-memory.dmp

memory/756-107-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/756-106-0x000000007F430000-0x000000007F440000-memory.dmp

memory/756-120-0x0000000074D20000-0x00000000754D0000-memory.dmp

memory/1728-121-0x0000000003AB0000-0x0000000003EAF000-memory.dmp

memory/2576-122-0x0000000074D20000-0x00000000754D0000-memory.dmp

memory/2576-123-0x00000000053D0000-0x00000000053E0000-memory.dmp

memory/2576-124-0x00000000053D0000-0x00000000053E0000-memory.dmp

memory/2576-130-0x0000000006220000-0x0000000006574000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 368f7311556ca2d2983cb5fb074106d3
SHA1 e0cd132075f98490af494545ae679b26917a314a
SHA256 edfdc2570fc0995498ddfe728d00d1004f84a6a4b65b81c8f7a6fb1a7dc01f81
SHA512 f9d77ae22f313ddc05bfed8f4ff19f16998d61dfddfc91d1367be413b19801226a221220297b3c4343c2fea6fe21fe93af43ed05f0de5f8ae28b528cb7c30af0

memory/2576-136-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/2576-137-0x00000000713E0000-0x0000000071734000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 49df23a9672cddebca8c572f209f50f7
SHA1 b2378ba3fb369124ef260da4d9b8b783a149ece6
SHA256 e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27
SHA512 5b325e833f46f10a64b63569b7b6006f712b5fb700fc168dd17f93d89760ab6b9cf577748a74eb563625cc8337c95edb4168cc7c666e9194fc9b26ac48c2adb0

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 adc9e240fe075bc01d94a9b2a0d1559f
SHA1 3d5bfc7f6a29a48f32738ff1edfba0115470fb13
SHA256 1b3501a90915876427e7a58abc04ec6bcfc1440ee3053b6ed10ee72bfd5af960
SHA512 531140e4815a700956b97eed2215dbab2aa62d7421cf79f2acb863666f5b4c3640ee19aebc80981a4b7c832c16edecf9ecc49f580e1a68cc2a357f208cfb9018

memory/1728-191-0x0000000000400000-0x0000000001DFD000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1496aeb65b0711e2dcc075b5721b2b61
SHA1 44c7c418c89da6b88623deb50257ccfcf5262373
SHA256 6415f201a1f0fb49a7df47d81ec3368935fcfb085f80f93b15c3c6dc45d58801
SHA512 c9d2b44bff098babffe000922e3c866fac95a4fd42b5e76ef7c97b6a1f75ff9f8a5cc187a348311033661bebbfdcc5e7c221563d66af13e1d97f0200ab55aadc

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b5ab388892357b5f9a0e5674d19b79e2
SHA1 69280aed4847b986002ef53403cff1e23ef81566
SHA256 851f2eb12e61c38b1493c41ef4147e74f7f1e0f23dd6c557fd9a304d32d1246c
SHA512 a374e11a306f2726afcd1606ed1ca91032cc6080a4777e664a663162a646b742a9afaec68a0024bb8ab9e91f64bf67aaecfadfcbcf4105c3aa8707b0aee3d4ed

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/180-261-0x0000000000400000-0x0000000001DFD000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2952-269-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/180-272-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/1160-273-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/180-275-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-277-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/1160-279-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/180-280-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-283-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-286-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-289-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-293-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-295-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-298-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-301-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/180-304-0x0000000000400000-0x0000000001DFD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 18:04

Reported

2024-04-19 18:06

Platform

win11-20240412-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-572 = "China Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2332 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2332 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2332 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\system32\cmd.exe
PID 708 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\system32\cmd.exe
PID 3784 wrote to memory of 1828 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3784 wrote to memory of 1828 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 708 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 3980 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 3980 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 3980 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 708 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 708 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 708 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe C:\Windows\rss\csrss.exe
PID 2844 wrote to memory of 3308 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 3308 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 3308 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2312 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2312 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2312 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 888 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 888 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 888 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 1572 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2844 wrote to memory of 1572 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3604 wrote to memory of 2024 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3604 wrote to memory of 2024 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3604 wrote to memory of 2024 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2024 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2024 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2024 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe

"C:\Users\Admin\AppData\Local\Temp\e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 server13.statscreate.org udp
BG 185.82.216.96:443 server13.statscreate.org tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun.l.google.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.96:443 server13.statscreate.org tcp
BG 185.82.216.96:443 server13.statscreate.org tcp
BG 185.82.216.96:443 server13.statscreate.org tcp

Files

memory/2332-1-0x0000000003E00000-0x00000000041F9000-memory.dmp

memory/2332-2-0x0000000004200000-0x0000000004AEB000-memory.dmp

memory/2332-3-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/1344-4-0x0000000002B80000-0x0000000002BB6000-memory.dmp

memory/1344-5-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/1344-6-0x0000000004E00000-0x0000000004E10000-memory.dmp

memory/1344-8-0x0000000005440000-0x0000000005A6A000-memory.dmp

memory/1344-7-0x0000000004E00000-0x0000000004E10000-memory.dmp

memory/1344-9-0x0000000005160000-0x0000000005182000-memory.dmp

memory/1344-10-0x0000000005200000-0x0000000005266000-memory.dmp

memory/1344-11-0x00000000052E0000-0x0000000005346000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0gmqkuf0.2bc.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1344-20-0x0000000005C70000-0x0000000005FC7000-memory.dmp

memory/1344-21-0x0000000006020000-0x000000000603E000-memory.dmp

memory/1344-22-0x0000000006070000-0x00000000060BC000-memory.dmp

memory/1344-23-0x00000000065A0000-0x00000000065E6000-memory.dmp

memory/1344-25-0x000000007F370000-0x000000007F380000-memory.dmp

memory/1344-24-0x0000000007460000-0x0000000007494000-memory.dmp

memory/1344-27-0x0000000070AA0000-0x0000000070DF7000-memory.dmp

memory/1344-26-0x0000000070920000-0x000000007096C000-memory.dmp

memory/1344-36-0x00000000074A0000-0x00000000074BE000-memory.dmp

memory/1344-37-0x0000000004E00000-0x0000000004E10000-memory.dmp

memory/1344-38-0x00000000074C0000-0x0000000007564000-memory.dmp

memory/1344-40-0x00000000075E0000-0x00000000075FA000-memory.dmp

memory/1344-39-0x0000000007C20000-0x000000000829A000-memory.dmp

memory/1344-41-0x0000000007620000-0x000000000762A000-memory.dmp

memory/1344-42-0x0000000007730000-0x00000000077C6000-memory.dmp

memory/1344-43-0x0000000007640000-0x0000000007651000-memory.dmp

memory/1344-44-0x0000000007690000-0x000000000769E000-memory.dmp

memory/1344-45-0x00000000076A0000-0x00000000076B5000-memory.dmp

memory/1344-46-0x00000000076F0000-0x000000000770A000-memory.dmp

memory/1344-47-0x0000000007710000-0x0000000007718000-memory.dmp

memory/1344-50-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/708-52-0x0000000003B60000-0x0000000003F5F000-memory.dmp

memory/2332-54-0x0000000003E00000-0x00000000041F9000-memory.dmp

memory/708-53-0x0000000003F60000-0x000000000484B000-memory.dmp

memory/708-55-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2584-56-0x00000000033D0000-0x00000000033E0000-memory.dmp

memory/2584-57-0x00000000033D0000-0x00000000033E0000-memory.dmp

memory/2584-67-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/2584-66-0x0000000006200000-0x0000000006557000-memory.dmp

memory/2584-68-0x000000007F990000-0x000000007F9A0000-memory.dmp

memory/2584-79-0x0000000007B50000-0x0000000007BF4000-memory.dmp

memory/2584-70-0x0000000070B50000-0x0000000070EA7000-memory.dmp

memory/2584-69-0x0000000070920000-0x000000007096C000-memory.dmp

memory/2332-80-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2584-81-0x00000000033D0000-0x00000000033E0000-memory.dmp

memory/2584-82-0x0000000007E70000-0x0000000007E81000-memory.dmp

memory/2584-83-0x0000000007EC0000-0x0000000007ED5000-memory.dmp

memory/2584-86-0x00000000746B0000-0x0000000074E61000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/1428-89-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

memory/1428-88-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/1428-90-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

memory/1428-93-0x0000000005ED0000-0x0000000006227000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ed74ce0c3bb722cc6888298384c80a1e
SHA1 973644342df732009485dd4283519861155eafb4
SHA256 6ae502eba3a575a2986bc5c4fd527f116c32122335ca2d188132c11617d5cc7a
SHA512 0619ae69020f23cf05e236539a4d2b89750c3cc4667ef60f895ddcd6721f2de70645c1432b69ce862ca4471bc4f7e61858c1f5c3517028ad8d47716b301e6891

memory/1428-102-0x0000000070920000-0x000000007096C000-memory.dmp

memory/1428-103-0x0000000070B70000-0x0000000070EC7000-memory.dmp

memory/1428-112-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

memory/1428-114-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/708-116-0x0000000003B60000-0x0000000003F5F000-memory.dmp

memory/3980-115-0x00000000746B0000-0x0000000074E61000-memory.dmp

memory/3980-118-0x0000000005510000-0x0000000005520000-memory.dmp

memory/3980-117-0x0000000005510000-0x0000000005520000-memory.dmp

memory/3980-127-0x0000000006260000-0x00000000065B7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 86e18b9c582545968c1c384edd64a551
SHA1 809242b502005e4e196c5d7bf6a4e4c687e64892
SHA256 2f67923f867d4fe79fbd455ebff5176a5b12596300237d2fa22a3a3b5435e45b
SHA512 c5b090c46f0257201bba4d883de6d488cb33af5b32059ba42a93f086b2a87ef7f4a9ed32f062cfe401204020f1195045167c3dc443d8333cac3b08446c6ea230

memory/3980-129-0x0000000070920000-0x000000007096C000-memory.dmp

memory/3980-130-0x00000000712F0000-0x0000000071647000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 49df23a9672cddebca8c572f209f50f7
SHA1 b2378ba3fb369124ef260da4d9b8b783a149ece6
SHA256 e738cb6f14a0ba594d90eceebb77e525f422a521175003823f4928cf19c04d27
SHA512 5b325e833f46f10a64b63569b7b6006f712b5fb700fc168dd17f93d89760ab6b9cf577748a74eb563625cc8337c95edb4168cc7c666e9194fc9b26ac48c2adb0

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a763075056b29036e7aae6d8584d3d46
SHA1 c01c4919e10757c6c385972a55818493104d9e35
SHA256 fee370c064792209aa0b611e7f92691f3e0c5a00b031d99005c1af4702188cd1
SHA512 16e54aaa3af25b26548117fff1dbd26abd33bb07284c43196103165ffbf7d4623629e89da444591b785cdada21167bfb3268f4740dd02858c948310fc24093f0

memory/708-178-0x0000000000400000-0x0000000001DFD000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 55d3c76620412e3ac488f3235275d9b2
SHA1 8f3cf581bbf505ba01c71f26a747e1fb8fb7ef66
SHA256 9d09552908b7741398cfe1c327cef453c0d429db6f127df887da43894bd90b1a
SHA512 6f29aca6f2628083f57f1a77fca5204e9060c83172e11c705478c12529f302ae17562657000af7d444b98d2cb027ad02e36ca096e8e7a940c36f0653ddd69cf8

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e8dc10ce63c737c01e69eb2a30e0a463
SHA1 b70e6dd82db872819a41b0f26dbd5d6549ae0f49
SHA256 253647c14ffb8196162d50b99b3d2db870f705513d998ec7a01eeb8adea5e33a
SHA512 bd0491793e4de819b61e868cfd46ceeb32228daf1b9808a44a31600544763029ab4e9aa6253fa9b354c613ed5f638081b8402fbd654b55859c1e3c997163f424

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2844-243-0x0000000000400000-0x0000000001DFD000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3604-252-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2844-255-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-257-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/396-258-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2844-261-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-265-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/396-266-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2844-269-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-273-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-277-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-281-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-285-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-289-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-295-0x0000000000400000-0x0000000001DFD000-memory.dmp

memory/2844-298-0x0000000000400000-0x0000000001DFD000-memory.dmp