Malware Analysis Report

2025-08-05 12:17

Sample ID 240419-yszjwseh41
Target 843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8
SHA256 843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8
Tags
glupteba discovery dropper evasion loader persistence upx rootkit
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8

Threat Level: Known bad

The file 843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion loader persistence upx rootkit

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Manipulates WinMonFS driver.

Checks installed software on the system

Adds Run key to start application

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Program crash

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-19 20:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 20:03

Reported

2024-04-19 20:06

Platform

win10v2004-20240412-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-571 = "China Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1300 wrote to memory of 3912 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1300 wrote to memory of 3912 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1300 wrote to memory of 3912 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 4416 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\system32\cmd.exe
PID 4652 wrote to memory of 4416 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\system32\cmd.exe
PID 4416 wrote to memory of 2636 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4416 wrote to memory of 2636 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4652 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4652 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 4652 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 4652 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 4972 wrote to memory of 4436 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4972 wrote to memory of 4436 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4972 wrote to memory of 4436 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4436 wrote to memory of 3204 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4436 wrote to memory of 3204 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4436 wrote to memory of 3204 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1300 -ip 1300

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 972

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4652 -ip 4652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 676

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 206.221.208.4.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 53c30ea2-d257-4347-935a-c7f187bd813d.uuid.allstatsin.ru udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 server1.allstatsin.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 stun1.l.google.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BE 172.253.120.127:19302 stun1.l.google.com udp
US 8.8.8.8:53 127.120.253.172.in-addr.arpa udp
BG 185.82.216.104:443 server1.allstatsin.ru tcp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 104.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
BG 185.82.216.104:443 server1.allstatsin.ru tcp
US 8.8.8.8:53 48.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
BG 185.82.216.104:443 server1.allstatsin.ru tcp
N/A 127.0.0.1:31465 tcp

Files

memory/1300-1-0x0000000003DB0000-0x00000000041B8000-memory.dmp

memory/1300-2-0x00000000041C0000-0x0000000004AAB000-memory.dmp

memory/1300-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3912-4-0x0000000004500000-0x0000000004536000-memory.dmp

memory/3912-5-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/3912-7-0x0000000004650000-0x0000000004660000-memory.dmp

memory/3912-6-0x0000000004C90000-0x00000000052B8000-memory.dmp

memory/3912-8-0x0000000004650000-0x0000000004660000-memory.dmp

memory/3912-9-0x0000000004AF0000-0x0000000004B12000-memory.dmp

memory/3912-10-0x0000000004B90000-0x0000000004BF6000-memory.dmp

memory/3912-11-0x00000000052C0000-0x0000000005326000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pkj3dtwe.w2d.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3912-18-0x00000000054B0000-0x0000000005804000-memory.dmp

memory/3912-22-0x0000000005AD0000-0x0000000005AEE000-memory.dmp

memory/3912-23-0x0000000005B70000-0x0000000005BBC000-memory.dmp

memory/3912-24-0x0000000006040000-0x0000000006084000-memory.dmp

memory/3912-25-0x0000000006C00000-0x0000000006C76000-memory.dmp

memory/3912-26-0x0000000007500000-0x0000000007B7A000-memory.dmp

memory/3912-27-0x0000000006EA0000-0x0000000006EBA000-memory.dmp

memory/3912-29-0x0000000007050000-0x0000000007082000-memory.dmp

memory/3912-28-0x000000007FB90000-0x000000007FBA0000-memory.dmp

memory/3912-30-0x00000000707C0000-0x000000007080C000-memory.dmp

memory/3912-31-0x0000000070F20000-0x0000000071274000-memory.dmp

memory/3912-41-0x0000000007090000-0x00000000070AE000-memory.dmp

memory/3912-43-0x00000000070B0000-0x0000000007153000-memory.dmp

memory/3912-42-0x0000000004650000-0x0000000004660000-memory.dmp

memory/3912-44-0x00000000071A0000-0x00000000071AA000-memory.dmp

memory/3912-45-0x0000000007260000-0x00000000072F6000-memory.dmp

memory/3912-46-0x00000000071C0000-0x00000000071D1000-memory.dmp

memory/3912-47-0x0000000007200000-0x000000000720E000-memory.dmp

memory/3912-48-0x0000000007210000-0x0000000007224000-memory.dmp

memory/3912-49-0x0000000007300000-0x000000000731A000-memory.dmp

memory/3912-50-0x0000000007240000-0x0000000007248000-memory.dmp

memory/3912-53-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/1300-55-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4652-56-0x0000000003B30000-0x0000000003F29000-memory.dmp

memory/1300-57-0x0000000003DB0000-0x00000000041B8000-memory.dmp

memory/1300-58-0x00000000041C0000-0x0000000004AAB000-memory.dmp

memory/4652-59-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2644-61-0x0000000002880000-0x0000000002890000-memory.dmp

memory/2644-60-0x0000000074A00000-0x00000000751B0000-memory.dmp

memory/2644-62-0x0000000002880000-0x0000000002890000-memory.dmp

memory/2644-65-0x0000000005C50000-0x0000000005FA4000-memory.dmp

memory/2644-73-0x00000000062B0000-0x00000000062FC000-memory.dmp

memory/2644-74-0x000000007F040000-0x000000007F050000-memory.dmp

memory/2644-76-0x0000000071060000-0x00000000713B4000-memory.dmp

memory/2644-75-0x00000000708C0000-0x000000007090C000-memory.dmp

memory/2644-87-0x0000000007220000-0x00000000072C3000-memory.dmp

memory/2644-86-0x0000000002880000-0x0000000002890000-memory.dmp

memory/2644-88-0x0000000007750000-0x0000000007761000-memory.dmp

memory/2644-89-0x00000000077A0000-0x00000000077B4000-memory.dmp

memory/2644-92-0x0000000074A00000-0x00000000751B0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3744-95-0x0000000004E90000-0x0000000004EA0000-memory.dmp

memory/3744-94-0x0000000074A00000-0x00000000751B0000-memory.dmp

memory/3744-96-0x0000000004E90000-0x0000000004EA0000-memory.dmp

memory/3744-106-0x0000000005DD0000-0x0000000006124000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1fed82c4af93eed919a8ac958f018f1c
SHA1 4a9afe348340016c0436bd38b0e725e78a40a151
SHA256 ef1db35cdeb8eaea9eccbcce025b5452d1ab747d4821726e791b54b8b5a5eea9
SHA512 1e495c00fa73329022ac287c3fbabd79fd33bfb46966fb71eefe309821cab10b75593db1aa53ea50ad8041e0dd3bae8b25bfe993bb14c7110fc67026b0b929a0

memory/3744-109-0x00000000708C0000-0x000000007090C000-memory.dmp

memory/4652-108-0x0000000003B30000-0x0000000003F29000-memory.dmp

memory/3744-110-0x000000007F0F0000-0x000000007F100000-memory.dmp

memory/3744-111-0x0000000070A40000-0x0000000070D94000-memory.dmp

memory/3744-121-0x0000000004E90000-0x0000000004EA0000-memory.dmp

memory/3744-122-0x0000000004E90000-0x0000000004EA0000-memory.dmp

memory/3744-124-0x0000000074A00000-0x00000000751B0000-memory.dmp

memory/3672-127-0x0000000002460000-0x0000000002470000-memory.dmp

memory/3672-126-0x0000000002460000-0x0000000002470000-memory.dmp

memory/3672-125-0x0000000074A00000-0x00000000751B0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 38f9a347b98fa03a6b3d166cc1be8a18
SHA1 d7c28f09a53967f7dc5eecff1f92b07e05a8f5ea
SHA256 cb41ba07a067dc2f7852ddea073f3f5b9ffb6284443ed45a68de9613a887dff8
SHA512 93a54481f87484a1d26c238acc3b97c48965a1e98462b2d4486ad8ca610244375a1cc286b6564109e71ef0786a34dabba937d2bfb6f08e1ff50f2e23be99eaab

C:\Windows\rss\csrss.exe

MD5 1c55bf2921a2794845b046dd317ab941
SHA1 558f6c725d67c19fd115e181d558a61deb5e62c3
SHA256 843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8
SHA512 aa72e9ae7b77994b42f7d82eee00ca1bbfb8522597bd226c4cee3438d904fb673b6e89348e366e5a86aa452dad38d1f5b64a14bbda01f5fdb1c7459d0825746b

memory/4652-158-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8572c9cbc43b0fedb31b74dcea57ca67
SHA1 41f55cd5c2dfaff2f81df8a222c1f1ac98eeb740
SHA256 568256e523db5b9e691a25fb725a5d36d93acdec3fa893eced5a74d18c3c84c8
SHA512 23d26ec2de687b99f8cf24346f6eb01cd1137a6b7805fcc662fb240674e33d6fe505efb89949d0c071f52f8638ad42610a376924c3841098e8cfd4f22fe3523a

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 fe457388dc1a294789cebc97c8e13100
SHA1 574d46edb370a18eb20cc61aff894a0fff6390ac
SHA256 bd86d4c245649cbbb134d0a3103e164dc1b35557489000e4c184c510c47f2f9d
SHA512 150c57737fa9de84791421cb2869aeae25e80a8072b5d10d5d00607cbfec71aa0dfcc3b03babe92e61e2cf411717979fefd40d5ef0342a13b62ee62916176225

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 63997d7721e457cf665674ac11913ad1
SHA1 f530563169e5aeaea4c5fb14d68f160e3a1cc898
SHA256 6a6e5266fc14622a13674530b8ae7b37c0d2de6b3ab797c789f13ee23b0cc53e
SHA512 a94b97e6abb4c253a051f70ceb62aef1af0c86752e91e7274ec4d0416fa26dca0e711cfdc444a598b207caf3ad953ef8bf9675af70b4951ae56e78757b468f21

memory/3700-251-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4972-265-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3700-266-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-275-0x00000000750D0000-0x00000000750ED000-memory.dmp

memory/3700-276-0x00000000750C0000-0x00000000750D0000-memory.dmp

memory/3476-278-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3700-279-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-292-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3476-304-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3700-305-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-318-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-337-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-356-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-375-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-394-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-413-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-432-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3700-456-0x0000000000400000-0x0000000001E06000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 20:03

Reported

2024-04-19 20:06

Platform

win11-20240412-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5020 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5020 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5020 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\system32\cmd.exe
PID 2744 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\system32\cmd.exe
PID 2404 wrote to memory of 1516 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2404 wrote to memory of 1516 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2744 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 904 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 904 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 904 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2744 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 2744 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 2744 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe C:\Windows\rss\csrss.exe
PID 2284 wrote to memory of 1468 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 1468 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 1468 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 656 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 656 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 656 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 1488 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 1488 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 1488 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2284 wrote to memory of 3516 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2284 wrote to memory of 3516 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4416 wrote to memory of 4880 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4416 wrote to memory of 4880 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4416 wrote to memory of 4880 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4880 wrote to memory of 4520 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4880 wrote to memory of 4520 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4880 wrote to memory of 4520 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe

"C:\Users\Admin\AppData\Local\Temp\843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5020 -ip 5020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 716

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2744 -ip 2744

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 852

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 65f05335-4b6b-4bb2-ac0e-dd3fdb585e2e.uuid.allstatsin.ru udp
US 8.8.8.8:53 server10.allstatsin.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server10.allstatsin.ru tcp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
IT 142.251.27.127:19302 stun3.l.google.com udp
BG 185.82.216.104:443 server10.allstatsin.ru tcp
BG 185.82.216.104:443 server10.allstatsin.ru tcp
N/A 127.0.0.1:31465 tcp

Files

memory/5020-1-0x0000000003D10000-0x000000000410A000-memory.dmp

memory/5020-2-0x0000000004110000-0x00000000049FB000-memory.dmp

memory/5020-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4640-5-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/4640-4-0x0000000002FB0000-0x0000000002FE6000-memory.dmp

memory/4640-6-0x0000000003040000-0x0000000003050000-memory.dmp

memory/4640-8-0x0000000003040000-0x0000000003050000-memory.dmp

memory/4640-7-0x00000000056F0000-0x0000000005D1A000-memory.dmp

memory/4640-9-0x00000000054B0000-0x00000000054D2000-memory.dmp

memory/4640-10-0x0000000005660000-0x00000000056C6000-memory.dmp

memory/4640-11-0x0000000005D90000-0x0000000005DF6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_olfqmndp.fwt.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4640-20-0x0000000005F80000-0x00000000062D7000-memory.dmp

memory/4640-21-0x0000000006480000-0x000000000649E000-memory.dmp

memory/4640-22-0x00000000064C0000-0x000000000650C000-memory.dmp

memory/4640-23-0x0000000006A40000-0x0000000006A86000-memory.dmp

memory/4640-24-0x000000007F5E0000-0x000000007F5F0000-memory.dmp

memory/4640-25-0x00000000078B0000-0x00000000078E4000-memory.dmp

memory/4640-26-0x00000000708F0000-0x000000007093C000-memory.dmp

memory/4640-27-0x0000000070A70000-0x0000000070DC7000-memory.dmp

memory/4640-37-0x0000000003040000-0x0000000003050000-memory.dmp

memory/4640-36-0x00000000078F0000-0x000000000790E000-memory.dmp

memory/4640-38-0x0000000007910000-0x00000000079B4000-memory.dmp

memory/4640-39-0x0000000008080000-0x00000000086FA000-memory.dmp

memory/4640-40-0x0000000007A40000-0x0000000007A5A000-memory.dmp

memory/4640-41-0x0000000007A80000-0x0000000007A8A000-memory.dmp

memory/4640-42-0x0000000007B90000-0x0000000007C26000-memory.dmp

memory/4640-43-0x0000000007AA0000-0x0000000007AB1000-memory.dmp

memory/4640-44-0x0000000007AF0000-0x0000000007AFE000-memory.dmp

memory/4640-45-0x0000000007B00000-0x0000000007B15000-memory.dmp

memory/4640-46-0x0000000007B50000-0x0000000007B6A000-memory.dmp

memory/4640-47-0x0000000007B40000-0x0000000007B48000-memory.dmp

memory/4640-50-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/2744-52-0x0000000003B30000-0x0000000003F2C000-memory.dmp

memory/2744-53-0x0000000003F30000-0x000000000481B000-memory.dmp

memory/5020-54-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2744-55-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2184-58-0x0000000004C00000-0x0000000004C10000-memory.dmp

memory/2184-57-0x0000000004C00000-0x0000000004C10000-memory.dmp

memory/2184-56-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/2184-67-0x0000000005B50000-0x0000000005EA7000-memory.dmp

memory/2184-68-0x00000000060C0000-0x000000000610C000-memory.dmp

memory/2184-70-0x0000000070A00000-0x0000000070A4C000-memory.dmp

memory/2184-69-0x000000007EE60000-0x000000007EE70000-memory.dmp

memory/2184-71-0x0000000070B80000-0x0000000070ED7000-memory.dmp

memory/2184-81-0x0000000007290000-0x0000000007334000-memory.dmp

memory/2184-80-0x0000000004C00000-0x0000000004C10000-memory.dmp

memory/2184-82-0x0000000004C00000-0x0000000004C10000-memory.dmp

memory/2184-83-0x00000000075B0000-0x00000000075C1000-memory.dmp

memory/2184-84-0x0000000007600000-0x0000000007615000-memory.dmp

memory/2184-87-0x0000000074680000-0x0000000074E31000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/3704-89-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/3704-99-0x00000000028E0000-0x00000000028F0000-memory.dmp

memory/3704-98-0x0000000005780000-0x0000000005AD7000-memory.dmp

memory/3704-100-0x00000000028E0000-0x00000000028F0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 fca5235a765d8b6872f8221b91925014
SHA1 ac02a08b2b5e8735a3e86e4dbe34d2d2d69de50b
SHA256 576deb22eff18b792de56f536c0241556a412528ca11521d62fa2e405b8c4fb1
SHA512 9900c04a435e25c395d6dbd34befaa321742c24c8d2456456d27e875bfdd16eb48a55863a335a1384100ef6d3c4b144bfc7e215c8310acd5a062c2dc9fc493b4

memory/3704-104-0x00000000713C0000-0x0000000071717000-memory.dmp

memory/3704-103-0x0000000070A00000-0x0000000070A4C000-memory.dmp

memory/3704-102-0x000000007FE20000-0x000000007FE30000-memory.dmp

memory/3704-114-0x00000000028E0000-0x00000000028F0000-memory.dmp

memory/3704-115-0x00000000028E0000-0x00000000028F0000-memory.dmp

memory/2744-113-0x0000000003B30000-0x0000000003F2C000-memory.dmp

memory/3704-117-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/904-118-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/904-119-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

memory/904-126-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

memory/904-120-0x0000000005A90000-0x0000000005DE7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 dda6d09baaa169353552f969b0a6a723
SHA1 f6113c95b9dad2eddebade2721484645df4b7287
SHA256 a0f0d6e5d913f7890b4ae58878ed0f1bdc348e981fe5a391dbd87911d51ac818
SHA512 cfe901d7042041142e3b9b63d211208e58bec60249e93d1412738e97c32fabd866de978dcec0fa6ce14ddd14656040f5301776490b35904a3aedf5835504025f

C:\Windows\rss\csrss.exe

MD5 1c55bf2921a2794845b046dd317ab941
SHA1 558f6c725d67c19fd115e181d558a61deb5e62c3
SHA256 843b947c53c5c2af2469d0ca781468870c0064b2225b4fdecc11e6cc24951ec8
SHA512 aa72e9ae7b77994b42f7d82eee00ca1bbfb8522597bd226c4cee3438d904fb673b6e89348e366e5a86aa452dad38d1f5b64a14bbda01f5fdb1c7459d0825746b

memory/2744-151-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d434d1086537f1c7c1692b7c3c3edd79
SHA1 741b403855dcaa4019a022762f28e6a0cf1bdb05
SHA256 7043d23ca1974b5b6a3ea670aad3109057e765b18646871515b59de34e0348cb
SHA512 de0ab9b50552fb8d399700f080e80f289c154da7e086c7f07eaeae089f5c59567d02b8fc6af31f23110427b44217a443ca89581d60540691ce5973f9f257b654

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 20586a2a295bec6370bfcc788bb1740f
SHA1 852cbd82648180c0a48329962501c25caebdf24b
SHA256 3804d72415f9f3a9027941b63260280fdacf89ffcf210b34105e34ad4d5cb56e
SHA512 073e9774af2291fb7390dd7dc8aee62d463e7fb8b3b82a467e0974067b16d3111c26919cff3d8c1a36fa7bd37b97593b0297297790d4f67b304d5bb788c18def

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5fedb927ed6e172cc090b9db2bacf856
SHA1 4154b04315e74348bee4769cccb8a5c3d2402753
SHA256 e63bc468e197e99b6cf16cd751667d1c39d664e19345e662cc8d40862e4b053c
SHA512 057ef17105699cb19c05d26fdf139fbdc6b037674cec24b4dfef12afcb4c35f5bdd9f5ca140fcac3f0626777d1020998e293c62f502b30ae55909be068ffead2

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2284-248-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4416-255-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2284-257-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4468-258-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2284-259-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-261-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4468-262-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2284-263-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-265-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-267-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-269-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-271-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-273-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-275-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-277-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2284-279-0x0000000000400000-0x0000000001E06000-memory.dmp