Malware Analysis Report

2025-08-05 12:18

Sample ID 240419-ysxqaseb22
Target 0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9
SHA256 0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9
Tags
glupteba discovery dropper evasion loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9

Threat Level: Known bad

The file 0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Manipulates WinMonFS driver.

Adds Run key to start application

Checks installed software on the system

Drops file in System32 directory

Launches sc.exe

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Program crash

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-19 20:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 20:03

Reported

2024-04-19 20:06

Platform

win10v2004-20240412-en

Max time kernel

150s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-162 = "Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3828 wrote to memory of 4068 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3828 wrote to memory of 4068 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3828 wrote to memory of 4068 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\system32\cmd.exe
PID 3256 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\system32\cmd.exe
PID 4324 wrote to memory of 860 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4324 wrote to memory of 860 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3256 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\windefender.exe
PID 3256 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\windefender.exe
PID 3256 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\windefender.exe
PID 3256 wrote to memory of 4572 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 4572 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 4572 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3256 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 3256 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 3256 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 3244 wrote to memory of 3908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 3908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 3908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 2208 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 2208 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 2208 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3244 wrote to memory of 4876 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3244 wrote to memory of 4876 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2328 wrote to memory of 2616 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2328 wrote to memory of 2616 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2328 wrote to memory of 2616 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2616 wrote to memory of 624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2616 wrote to memory of 624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2616 wrote to memory of 624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3828 -ip 3828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 764

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3256 -ip 3256

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 908

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 a6da529c-ac25-40a4-8c6c-46d698b07db2.uuid.statsexplorer.org udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server4.statsexplorer.org udp
US 162.159.135.233:443 cdn.discordapp.com tcp
NL 74.125.128.127:19302 stun2.l.google.com udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
BG 185.82.216.108:443 server4.statsexplorer.org tcp
US 8.8.8.8:53 127.128.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 48.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
BG 185.82.216.108:443 server4.statsexplorer.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
BG 185.82.216.108:443 server4.statsexplorer.org tcp
N/A 127.0.0.1:31465 tcp

Files

memory/3828-1-0x0000000003D20000-0x0000000004126000-memory.dmp

memory/3828-2-0x0000000004130000-0x0000000004A1B000-memory.dmp

memory/3828-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4068-4-0x0000000002F10000-0x0000000002F46000-memory.dmp

memory/4068-5-0x0000000074140000-0x00000000748F0000-memory.dmp

memory/4068-8-0x0000000002F70000-0x0000000002F80000-memory.dmp

memory/4068-7-0x00000000055F0000-0x0000000005C18000-memory.dmp

memory/4068-6-0x0000000002F70000-0x0000000002F80000-memory.dmp

memory/4068-9-0x0000000005510000-0x0000000005532000-memory.dmp

memory/4068-10-0x0000000005D20000-0x0000000005D86000-memory.dmp

memory/4068-11-0x0000000005D90000-0x0000000005DF6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_egd5yqq0.kze.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4068-17-0x0000000005EC0000-0x0000000006214000-memory.dmp

memory/4068-22-0x00000000064F0000-0x000000000650E000-memory.dmp

memory/4068-23-0x0000000006520000-0x000000000656C000-memory.dmp

memory/4068-24-0x0000000006A30000-0x0000000006A74000-memory.dmp

memory/4068-25-0x0000000007810000-0x0000000007886000-memory.dmp

memory/4068-27-0x00000000078B0000-0x00000000078CA000-memory.dmp

memory/4068-26-0x0000000007F10000-0x000000000858A000-memory.dmp

memory/4068-43-0x0000000002F70000-0x0000000002F80000-memory.dmp

memory/4068-42-0x0000000007AC0000-0x0000000007B63000-memory.dmp

memory/4068-41-0x0000000007AA0000-0x0000000007ABE000-memory.dmp

memory/4068-31-0x0000000070580000-0x00000000708D4000-memory.dmp

memory/4068-30-0x000000006FFE0000-0x000000007002C000-memory.dmp

memory/4068-29-0x000000007FA00000-0x000000007FA10000-memory.dmp

memory/4068-28-0x0000000007A60000-0x0000000007A92000-memory.dmp

memory/4068-44-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

memory/4068-45-0x0000000007CC0000-0x0000000007D56000-memory.dmp

memory/4068-46-0x0000000007BC0000-0x0000000007BD1000-memory.dmp

memory/4068-48-0x0000000007C20000-0x0000000007C34000-memory.dmp

memory/4068-47-0x0000000007C00000-0x0000000007C0E000-memory.dmp

memory/4068-50-0x0000000007C50000-0x0000000007C58000-memory.dmp

memory/4068-49-0x0000000007C60000-0x0000000007C7A000-memory.dmp

memory/4068-53-0x0000000074140000-0x00000000748F0000-memory.dmp

memory/3256-55-0x0000000003B30000-0x0000000003F31000-memory.dmp

memory/3828-57-0x0000000003D20000-0x0000000004126000-memory.dmp

memory/3828-56-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3256-58-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3828-59-0x0000000004130000-0x0000000004A1B000-memory.dmp

memory/2428-60-0x0000000074220000-0x00000000749D0000-memory.dmp

memory/2428-61-0x0000000002960000-0x0000000002970000-memory.dmp

memory/2428-62-0x00000000057F0000-0x0000000005B44000-memory.dmp

memory/2428-72-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

memory/2428-75-0x0000000070880000-0x0000000070BD4000-memory.dmp

memory/2428-86-0x0000000002960000-0x0000000002970000-memory.dmp

memory/2428-85-0x0000000007020000-0x00000000070C3000-memory.dmp

memory/2428-74-0x00000000700E0000-0x000000007012C000-memory.dmp

memory/2428-73-0x000000007F360000-0x000000007F370000-memory.dmp

memory/2428-87-0x0000000007350000-0x0000000007361000-memory.dmp

memory/2428-88-0x00000000073A0000-0x00000000073B4000-memory.dmp

memory/2428-91-0x0000000074220000-0x00000000749D0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/2328-94-0x0000000002E50000-0x0000000002E60000-memory.dmp

memory/2328-95-0x0000000002E50000-0x0000000002E60000-memory.dmp

memory/2328-93-0x0000000074220000-0x00000000749D0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6fd648f321ccf444329121c92b4be483
SHA1 0a0adf984dc96159a61c218125f751ad317d4241
SHA256 bc2cbbc1c18f062fd496110e46789369b5a4b361f57ea54d79669d524680d21f
SHA512 c23967997dedaeef730b334a1e1f8d2e2375fe4b153b8beae8336f3bd5545d278916ca3373d84d4f9211308a6e7596b9c7c8a18d454c3c7cfe0ea7c32aa91b52

memory/2328-105-0x0000000005DE0000-0x0000000006134000-memory.dmp

memory/2328-108-0x00000000700E0000-0x000000007012C000-memory.dmp

memory/2328-120-0x0000000002E50000-0x0000000002E60000-memory.dmp

memory/2328-119-0x000000007F890000-0x000000007F8A0000-memory.dmp

memory/2328-121-0x0000000002E50000-0x0000000002E60000-memory.dmp

memory/2328-109-0x00000000702C0000-0x0000000070614000-memory.dmp

memory/3256-107-0x0000000003B30000-0x0000000003F31000-memory.dmp

memory/2328-123-0x0000000074220000-0x00000000749D0000-memory.dmp

memory/4572-124-0x0000000074220000-0x00000000749D0000-memory.dmp

memory/4572-125-0x0000000002600000-0x0000000002610000-memory.dmp

memory/4572-126-0x0000000002600000-0x0000000002610000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 222951843a036b992013cfe467f9d86c
SHA1 1c9259ef2bf26181986cd9795e6d08dffee62fec
SHA256 0d7b53459c78e6b0d497ad42aeed5c7469bf88c6be0488b1ca3e5c58e910052a
SHA512 f2a6dacdc401b97c3d5647e01a1d7295dcab7e409caae6e05d7fc46c6eaf645b0f8487a44649ed20cbdef9043c4a1b6066b075fb1a1e40030ad8584d33d395d2

memory/3256-137-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d84397dede99042bb8edc878c1443c5a
SHA1 830660be591f0a89704bd90181f4f79863507ed3
SHA256 0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9
SHA512 73240b71af1fd30a8cf2f62ea30be071c127dcb6b165ca2dc69bfb091188d8b30902a89bfd9ef12c37c59ffe998b7c7643a5fa8799079ec751276940ddc7017b

memory/3256-157-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 89fd43077e4732b250b1e7b4c308c765
SHA1 5af013dae9a030a132984792086e81d010c9da2e
SHA256 1928b4c5015595deb778d1c787acb10e96c730ff47e76b29e504bbea58ffac32
SHA512 b5493a9c6fbd78847f49ffdeb0976c36c8374c8cb7380e1eaff701c806003469f18718acc21c5e08aebae9b90e86aface018d3af96b3d5798044c9d953c18730

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8f883aefa6f32b42779b39e278a59d36
SHA1 29ba90ba07d347dd503fb20a43b271c635885bc6
SHA256 f161df019d050c7b080520cce32da82506a55eb5ecb2236f80c31c0a68513ed4
SHA512 e56a14786aa2762038eb93272a8445bc6217cb306ca37b659a5a8c67c1f5c0159a2066cefc39566281ad371b4a391981c28272ef9f3ccfb5b8a67682ab4bed39

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f3e1f5685c351d6081ad56a88f29c1c3
SHA1 862541810d50303803edfaa432201734cabfe4af
SHA256 4c52f570600ac7d2b70ab012c90f0b93ad628566a3fae82c09b5bf529887443c
SHA512 1f6678a7c1d8f1b4a0fc22cd73a4aed20de8f49e08ea3ee84151d76085a83b10376642f5f30ed55735ed80799decedf594d0a9aafa8225ac265200428c77a18c

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3244-258-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2328-265-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3244-266-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-267-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4852-268-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3244-270-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4852-271-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3244-272-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-274-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-276-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-277-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4852-278-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3244-279-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-282-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-284-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-286-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3244-288-0x0000000000400000-0x0000000001E06000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 20:03

Reported

2024-04-19 20:06

Platform

win11-20240412-en

Max time kernel

138s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4160 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4160 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4160 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\system32\cmd.exe
PID 4948 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\system32\cmd.exe
PID 1600 wrote to memory of 3688 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1600 wrote to memory of 3688 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4948 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4948 wrote to memory of 280 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 4948 wrote to memory of 280 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 4948 wrote to memory of 280 N/A C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe C:\Windows\rss\csrss.exe
PID 280 wrote to memory of 1792 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 1792 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 1792 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 280 wrote to memory of 2032 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 280 wrote to memory of 2032 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2848 wrote to memory of 4468 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2848 wrote to memory of 4468 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2848 wrote to memory of 4468 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4468 wrote to memory of 4360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4468 wrote to memory of 4360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4468 wrote to memory of 4360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2328 -ip 2328

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 2364

C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe

"C:\Users\Admin\AppData\Local\Temp\0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4948 -ip 4948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 828

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 d92216ec-a0ad-49ad-bcec-7b7e19caaef1.uuid.statsexplorer.org udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server14.statsexplorer.org udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server14.statsexplorer.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
BG 185.82.216.108:443 server14.statsexplorer.org tcp
BG 185.82.216.108:443 server14.statsexplorer.org tcp

Files

memory/4160-1-0x0000000003DA0000-0x00000000041A8000-memory.dmp

memory/4160-2-0x00000000041B0000-0x0000000004A9B000-memory.dmp

memory/4160-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2328-5-0x0000000074560000-0x0000000074D11000-memory.dmp

memory/2328-4-0x0000000002F70000-0x0000000002FA6000-memory.dmp

memory/2328-6-0x0000000005060000-0x0000000005070000-memory.dmp

memory/2328-7-0x00000000056A0000-0x0000000005CCA000-memory.dmp

memory/2328-8-0x00000000055A0000-0x00000000055C2000-memory.dmp

memory/2328-9-0x0000000005CD0000-0x0000000005D36000-memory.dmp

memory/2328-15-0x0000000005DF0000-0x0000000005E56000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sfkkqlug.rha.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2328-19-0x00000000060A0000-0x00000000063F7000-memory.dmp

memory/2328-20-0x0000000006470000-0x000000000648E000-memory.dmp

memory/2328-21-0x0000000006490000-0x00000000064DC000-memory.dmp

memory/2328-22-0x00000000069F0000-0x0000000006A36000-memory.dmp

memory/2328-24-0x000000007F0C0000-0x000000007F0D0000-memory.dmp

memory/2328-23-0x0000000007870000-0x00000000078A4000-memory.dmp

memory/2328-25-0x00000000707D0000-0x000000007081C000-memory.dmp

memory/2328-26-0x0000000070950000-0x0000000070CA7000-memory.dmp

memory/2328-35-0x00000000078B0000-0x00000000078CE000-memory.dmp

memory/2328-36-0x00000000078D0000-0x0000000007974000-memory.dmp

memory/2328-37-0x0000000008030000-0x00000000086AA000-memory.dmp

memory/2328-38-0x00000000079F0000-0x0000000007A0A000-memory.dmp

memory/2328-39-0x0000000007A30000-0x0000000007A3A000-memory.dmp

memory/2328-40-0x0000000074560000-0x0000000074D11000-memory.dmp

memory/4160-41-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4948-43-0x0000000003B90000-0x0000000003F8A000-memory.dmp

memory/4160-44-0x00000000041B0000-0x0000000004A9B000-memory.dmp

memory/4948-45-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/1676-46-0x0000000074600000-0x0000000074DB1000-memory.dmp

memory/1676-47-0x0000000002920000-0x0000000002930000-memory.dmp

memory/1676-57-0x0000000005A00000-0x0000000005D57000-memory.dmp

memory/1676-48-0x0000000002920000-0x0000000002930000-memory.dmp

memory/1676-58-0x0000000005FC0000-0x000000000600C000-memory.dmp

memory/1676-60-0x00000000708E0000-0x000000007092C000-memory.dmp

memory/1676-61-0x0000000070A60000-0x0000000070DB7000-memory.dmp

memory/1676-59-0x000000007F250000-0x000000007F260000-memory.dmp

memory/1676-71-0x0000000007060000-0x0000000007104000-memory.dmp

memory/1676-70-0x0000000002920000-0x0000000002930000-memory.dmp

memory/1676-72-0x0000000007460000-0x00000000074F6000-memory.dmp

memory/1676-73-0x0000000007380000-0x0000000007391000-memory.dmp

memory/1676-74-0x00000000073C0000-0x00000000073CE000-memory.dmp

memory/1676-75-0x00000000073D0000-0x00000000073E5000-memory.dmp

memory/1676-76-0x0000000007410000-0x000000000742A000-memory.dmp

memory/1676-77-0x0000000007430000-0x0000000007438000-memory.dmp

memory/1676-80-0x0000000074600000-0x0000000074DB1000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/4380-82-0x0000000074600000-0x0000000074DB1000-memory.dmp

memory/4380-84-0x0000000004C50000-0x0000000004C60000-memory.dmp

memory/4380-83-0x0000000004C50000-0x0000000004C60000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f71565b8b6e063d888ae6a946b01b806
SHA1 96723537bb28226f4cfb0ba217bafe06a895c148
SHA256 3b7120956c0d4ac925f0df9479d584227e2605e70950211f3fc1e39ff8d44052
SHA512 565913929ff34ae4c823555ac61882ec1fd4238c0e5a14599cdac17dcc98ee690371c927d692abef815ec3fb7dc60d9c9ae14557bc1b29f36452803d544bfc7c

memory/4948-94-0x0000000003B90000-0x0000000003F8A000-memory.dmp

memory/4380-96-0x000000007EF10000-0x000000007EF20000-memory.dmp

memory/4380-97-0x0000000070A60000-0x0000000070DB7000-memory.dmp

memory/4380-95-0x00000000708E0000-0x000000007092C000-memory.dmp

memory/4380-106-0x0000000004C50000-0x0000000004C60000-memory.dmp

memory/4380-108-0x0000000074600000-0x0000000074DB1000-memory.dmp

memory/3700-109-0x0000000074600000-0x0000000074DB1000-memory.dmp

memory/4948-110-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-119-0x0000000005FB0000-0x0000000006307000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cd100e491e7fe067e86907058fcc334a
SHA1 1d262948e36e25983201aeabc9846fb06a1e6d5b
SHA256 9696cfe35286fc9114d0b993e9a0d6ba40ffd01e4b135c404f3f97e39d0428a3
SHA512 f465c9af53b62019ca0f95743c2d8c5c96ce2363516765e20ae73925669db7ed902614c53e8720dc0a196043e68b8b5a5e60846e5c504d804f7e50463142bc0e

memory/3700-121-0x000000007FD40000-0x000000007FD50000-memory.dmp

memory/3700-122-0x00000000708E0000-0x000000007092C000-memory.dmp

memory/3700-123-0x0000000070A80000-0x0000000070DD7000-memory.dmp

memory/3700-132-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/3700-133-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/3700-135-0x0000000074600000-0x0000000074DB1000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d84397dede99042bb8edc878c1443c5a
SHA1 830660be591f0a89704bd90181f4f79863507ed3
SHA256 0b647d445fa52b03f2a345b8ecffa10fd53f5e44a3be69e1290dccb64ece77c9
SHA512 73240b71af1fd30a8cf2f62ea30be071c127dcb6b165ca2dc69bfb091188d8b30902a89bfd9ef12c37c59ffe998b7c7643a5fa8799079ec751276940ddc7017b

memory/280-142-0x0000000004000000-0x0000000004400000-memory.dmp

memory/4948-141-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-143-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d12dbc87ece8d2ab77634395bd609bed
SHA1 beb943209d2e04b12c4066392097d36f7573972a
SHA256 36d362c0e687a358ac527d8921c1ae3626e68c1bde944315c634d81871db9799
SHA512 100847375eda2c6cc45423f8363ea312436841a776ed683c77a82749fff265a8d4915cb4e0f701db501a01b60d2e0b2fc84ab80485fb7e9f447bd39b50ae13fe

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 57d4d90f7700db04d35f5837ed28595a
SHA1 42f338863b8a1bd85486f937f43766d27b7aa525
SHA256 d64484aa33f33c6cb4e9d4451e4966beb20e215cd2274877ac6221f9815b35c7
SHA512 b21321a3b2f99a0089333ce5ef6cb05b7392cd879e9e5f23f44de52b3159f79a34d2c8488d06fed22a323d0c25900e2478adda548104528af23baf7e7ee28cd0

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9e4314b20512fead9e15329ee463d6a8
SHA1 e887e1614e916c6eba3751957667d812104baa0c
SHA256 94892d525dbe672e29c1f7badfaadb916e85a978fac1207cf5afb2bc9e75098f
SHA512 ece1bcad7ec24da4a99227805795644f2c0ba446c08bfd72eaa36467ac74c23811af7fdd2c0bdb4cdffcd9b9a97f8bd7f544ea3c77d71a5c449d71043468561f

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/280-234-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2848-241-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/280-242-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-243-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4064-244-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/280-245-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-247-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4064-248-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/280-250-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-251-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-253-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-255-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-257-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-260-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-261-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/280-263-0x0000000000400000-0x0000000001E06000-memory.dmp