Malware Analysis Report

2025-08-05 12:17

Sample ID 240419-ytvmbseb43
Target 07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14
SHA256 07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14
Tags
glupteba discovery dropper evasion loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14

Threat Level: Known bad

The file 07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

UPX packed file

Executes dropped EXE

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Program crash

Modifies data under HKEY_USERS

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-19 20:05

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 20:05

Reported

2024-04-19 20:07

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-162 = "Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3580 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 3540 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\system32\cmd.exe
PID 3944 wrote to memory of 3540 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\system32\cmd.exe
PID 3540 wrote to memory of 4968 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Conhost.exe
PID 3540 wrote to memory of 4968 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Conhost.exe
PID 3944 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3944 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 3944 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 3944 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 3580 wrote to memory of 4296 N/A C:\Windows\rss\csrss.exe C:\Windows\SYSTEM32\schtasks.exe
PID 3580 wrote to memory of 4296 N/A C:\Windows\rss\csrss.exe C:\Windows\SYSTEM32\schtasks.exe
PID 3580 wrote to memory of 4296 N/A C:\Windows\rss\csrss.exe C:\Windows\SYSTEM32\schtasks.exe
PID 3580 wrote to memory of 116 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 116 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 116 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 5080 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 5080 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 5080 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3580 wrote to memory of 2480 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3580 wrote to memory of 2480 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4780 wrote to memory of 2292 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4780 wrote to memory of 2292 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4780 wrote to memory of 2292 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2292 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2292 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2292 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3580 -ip 3580

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 932

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 b658e39b-6364-435f-9207-23be9a1abc21.uuid.alldatadump.org udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server13.alldatadump.org udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 162.159.129.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server13.alldatadump.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 142.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 stun2.l.google.com udp
NL 74.125.128.127:19302 stun2.l.google.com udp
US 8.8.8.8:53 127.128.125.74.in-addr.arpa udp
US 8.8.8.8:53 14.251.17.2.in-addr.arpa udp
BG 185.82.216.108:443 server13.alldatadump.org tcp
N/A 127.0.0.1:3478 udp
US 8.8.8.8:53 udp
N/A 2.18.121.142:80 tcp
N/A 127.0.0.1:3478 udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
N/A 127.0.0.1:31465 tcp

Files

memory/3580-1-0x0000000003CC0000-0x00000000040B9000-memory.dmp

memory/3580-2-0x00000000040C0000-0x00000000049AB000-memory.dmp

memory/3580-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/1904-4-0x0000000002A40000-0x0000000002A76000-memory.dmp

memory/1904-5-0x00000000744E0000-0x0000000074C90000-memory.dmp

memory/1904-6-0x0000000004D00000-0x0000000004D10000-memory.dmp

memory/1904-7-0x0000000005340000-0x0000000005968000-memory.dmp

memory/1904-8-0x0000000005060000-0x0000000005082000-memory.dmp

memory/1904-9-0x0000000005100000-0x0000000005166000-memory.dmp

memory/1904-10-0x0000000005970000-0x00000000059D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pxlovsa4.jha.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1904-20-0x0000000005AE0000-0x0000000005E34000-memory.dmp

memory/1904-21-0x0000000006020000-0x000000000603E000-memory.dmp

memory/1904-22-0x0000000006060000-0x00000000060AC000-memory.dmp

memory/1904-23-0x0000000006590000-0x00000000065D4000-memory.dmp

memory/1904-24-0x0000000007140000-0x00000000071B6000-memory.dmp

memory/1904-25-0x0000000007A70000-0x00000000080EA000-memory.dmp

memory/1904-26-0x00000000073F0000-0x000000000740A000-memory.dmp

memory/1904-28-0x000000007F730000-0x000000007F740000-memory.dmp

memory/1904-27-0x00000000075A0000-0x00000000075D2000-memory.dmp

memory/1904-29-0x0000000070380000-0x00000000703CC000-memory.dmp

memory/1904-30-0x0000000070500000-0x0000000070854000-memory.dmp

memory/1904-41-0x00000000075E0000-0x00000000075FE000-memory.dmp

memory/1904-40-0x0000000004D00000-0x0000000004D10000-memory.dmp

memory/1904-42-0x0000000007600000-0x00000000076A3000-memory.dmp

memory/1904-43-0x00000000076F0000-0x00000000076FA000-memory.dmp

memory/1904-44-0x0000000004D00000-0x0000000004D10000-memory.dmp

memory/1904-45-0x0000000007800000-0x0000000007896000-memory.dmp

memory/1904-46-0x0000000007700000-0x0000000007711000-memory.dmp

memory/1904-47-0x0000000007740000-0x000000000774E000-memory.dmp

memory/1904-48-0x0000000007760000-0x0000000007774000-memory.dmp

memory/1904-49-0x00000000077B0000-0x00000000077CA000-memory.dmp

memory/1904-50-0x00000000077A0000-0x00000000077A8000-memory.dmp

memory/1904-53-0x00000000744E0000-0x0000000074C90000-memory.dmp

memory/3580-56-0x0000000003CC0000-0x00000000040B9000-memory.dmp

memory/3580-55-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3944-57-0x0000000003B80000-0x0000000003F80000-memory.dmp

memory/3944-58-0x0000000003F80000-0x000000000486B000-memory.dmp

memory/3944-59-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4564-62-0x00000000052D0000-0x00000000052E0000-memory.dmp

memory/4564-61-0x00000000052D0000-0x00000000052E0000-memory.dmp

memory/4564-60-0x0000000074580000-0x0000000074D30000-memory.dmp

memory/4564-72-0x0000000005F40000-0x0000000006294000-memory.dmp

memory/4564-73-0x0000000006AB0000-0x0000000006AFC000-memory.dmp

memory/4564-76-0x0000000070C20000-0x0000000070F74000-memory.dmp

memory/4564-75-0x0000000070480000-0x00000000704CC000-memory.dmp

memory/4564-87-0x0000000007750000-0x00000000077F3000-memory.dmp

memory/4564-86-0x00000000052D0000-0x00000000052E0000-memory.dmp

memory/4564-74-0x000000007F200000-0x000000007F210000-memory.dmp

memory/4564-88-0x0000000007A70000-0x0000000007A81000-memory.dmp

memory/4564-89-0x0000000007AC0000-0x0000000007AD4000-memory.dmp

memory/4564-92-0x0000000074580000-0x0000000074D30000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3028-96-0x0000000002E40000-0x0000000002E50000-memory.dmp

memory/3028-95-0x0000000002E40000-0x0000000002E50000-memory.dmp

memory/3028-94-0x0000000074580000-0x0000000074D30000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 eabd7dc98b51af67f75f6bbecf9f3dae
SHA1 0ded0232757cd67102106523e1b2a54f50794cb4
SHA256 598e9b95ba4f2fa13df12485c9d65636d0ac4a85c9731abd617d44b4825588b9
SHA512 6ecc420796926768500e2de7d2f38b962cdee8f6564cdffba250b320e3fb597ac30997f261bad491ab1e185b79c5c385f73cb1c64a28aef29b3b97c4d242c4cc

memory/3028-108-0x0000000070480000-0x00000000704CC000-memory.dmp

memory/3028-119-0x0000000002E40000-0x0000000002E50000-memory.dmp

memory/3028-109-0x0000000070C20000-0x0000000070F74000-memory.dmp

memory/3028-107-0x000000007F520000-0x000000007F530000-memory.dmp

memory/3028-121-0x0000000074580000-0x0000000074D30000-memory.dmp

memory/1392-122-0x0000000074580000-0x0000000074D30000-memory.dmp

memory/1392-123-0x0000000005180000-0x0000000005190000-memory.dmp

memory/1392-124-0x0000000005180000-0x0000000005190000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cd280675f29e789921f51fb858ad581c
SHA1 d5ca214121883cbe64693ca43259291d841de67e
SHA256 7c146ec6acf735fbf9060671c63f3adc6f60d5d6aad71e6caf8eda733f226ec8
SHA512 156e1c17fbddb0e4e6d250d8bfd22517891819c0bf4ec362c8d1663ce4ceef5980acfb8252d9eea56d7062f4e4de62ad4ae1a24076f3e95556553d4c7898492a

memory/1392-136-0x0000000070480000-0x00000000704CC000-memory.dmp

memory/1392-137-0x0000000070C20000-0x0000000070F74000-memory.dmp

memory/3944-135-0x0000000003B80000-0x0000000003F80000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d08a89716dfc10241358be5cd12c12c7
SHA1 a1499b609197316bef4200c25969d105a231896d
SHA256 07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14
SHA512 2c0dbc61276c63138332722c5dccef7fa1d2ad53362d5d15b5ee4b40aa852c14085f334085d2876198b0940df9b63b4de345c5881804273d595f9481595eaf14

memory/3944-154-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0e63e755803fede5a70167ee1bd3ad25
SHA1 db6e7868091bbf99953347657c368654f48de06d
SHA256 1440cdb3098b0e4566cd003b1e9ec639305d00323e14bc76525b3d9d65ddb1f7
SHA512 80cf86463f42bfde1ee2e2044fdcaf6dcbb27462842c16d12e95262f7dfb60746545239a3b785b2dde9827dc306934475baad41afe51ef56bc50a447b9b011bb

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 fef0433e2a5886e60f454630e10e37fa
SHA1 932b6fdd0a5bd24a71aeee99656e586e2efd8d18
SHA256 9a6e8bc4e8b031d1fa3bd690119eb316d9a3d8f059fcf82bf69fa8f6539063c5
SHA512 aa888db196584e0f74ccc636fa9f42cd3a2b68ca3370caf3e1468bdfabc594b87d95cf1d53ec900a2753cdc270a33b4efb64c207aa4e5eef1936d193a9ba1d5a

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 96d0d1ac90d2a2dba3c88d86954419a8
SHA1 df0f293233c391cff882fa7ad3c18848f3c10125
SHA256 bfe0608338727fef3697e23b5884a252bcce0ce0dc5740cf10fdb65f127371ab
SHA512 b29cd76a5e0a7fd66660cf19a9c153d430fb729f3874596edded03adc2d29e30d4f97aa721c291b937bcb441bafa2f9ee6a21a60ec6a6b6c4ba1a3de7991e030

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3580-256-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4780-264-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3580-265-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4788-267-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3580-266-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-268-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/4788-270-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3580-271-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-273-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-274-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-276-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-279-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-281-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-282-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-284-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3580-286-0x0000000000400000-0x0000000001E06000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 20:05

Reported

2024-04-19 20:07

Platform

win11-20240412-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1344 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1344 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1344 wrote to memory of 3596 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\system32\cmd.exe
PID 572 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\system32\cmd.exe
PID 3748 wrote to memory of 3176 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3748 wrote to memory of 3176 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 572 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3484 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3484 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 3484 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 572 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 572 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 572 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe C:\Windows\rss\csrss.exe
PID 2892 wrote to memory of 548 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 548 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 548 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 4552 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 4552 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 4552 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 1104 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2892 wrote to memory of 1104 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3812 wrote to memory of 4740 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3812 wrote to memory of 4740 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3812 wrote to memory of 4740 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4740 wrote to memory of 1904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4740 wrote to memory of 1904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4740 wrote to memory of 1904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe

"C:\Users\Admin\AppData\Local\Temp\07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1344 -ip 1344

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 680

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 572 -ip 572

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 920

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 370fa80f-45ca-4c06-a4bd-73e9c723626a.uuid.alldatadump.org udp
US 8.8.8.8:53 server3.alldatadump.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
CH 172.217.210.127:19302 stun4.l.google.com udp
BG 185.82.216.108:443 server3.alldatadump.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
BG 185.82.216.108:443 server3.alldatadump.org tcp
N/A 127.0.0.1:31465 tcp

Files

memory/1344-1-0x0000000003E40000-0x0000000004247000-memory.dmp

memory/1344-2-0x0000000004250000-0x0000000004B3B000-memory.dmp

memory/1344-3-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3596-4-0x0000000004D40000-0x0000000004D76000-memory.dmp

memory/3596-5-0x0000000074010000-0x00000000747C1000-memory.dmp

memory/3596-6-0x0000000002D00000-0x0000000002D10000-memory.dmp

memory/3596-7-0x0000000002D00000-0x0000000002D10000-memory.dmp

memory/3596-8-0x00000000053B0000-0x00000000059DA000-memory.dmp

memory/3596-9-0x00000000052D0000-0x00000000052F2000-memory.dmp

memory/3596-10-0x00000000059E0000-0x0000000005A46000-memory.dmp

memory/3596-11-0x0000000005A50000-0x0000000005AB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bm4cncpx.j2r.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3596-20-0x0000000005C60000-0x0000000005FB7000-memory.dmp

memory/3596-22-0x00000000061F0000-0x000000000623C000-memory.dmp

memory/3596-21-0x00000000061A0000-0x00000000061BE000-memory.dmp

memory/3596-23-0x0000000006760000-0x00000000067A6000-memory.dmp

memory/3596-24-0x000000007F450000-0x000000007F460000-memory.dmp

memory/3596-27-0x0000000070470000-0x00000000707C7000-memory.dmp

memory/3596-37-0x0000000002D00000-0x0000000002D10000-memory.dmp

memory/3596-36-0x0000000007610000-0x000000000762E000-memory.dmp

memory/3596-26-0x0000000070280000-0x00000000702CC000-memory.dmp

memory/3596-38-0x0000000007630000-0x00000000076D4000-memory.dmp

memory/3596-25-0x00000000075D0000-0x0000000007604000-memory.dmp

memory/3596-40-0x0000000007760000-0x000000000777A000-memory.dmp

memory/3596-39-0x0000000007DA0000-0x000000000841A000-memory.dmp

memory/3596-41-0x00000000077A0000-0x00000000077AA000-memory.dmp

memory/3596-42-0x0000000007860000-0x00000000078F6000-memory.dmp

memory/3596-43-0x00000000077D0000-0x00000000077E1000-memory.dmp

memory/3596-44-0x0000000007810000-0x000000000781E000-memory.dmp

memory/3596-45-0x0000000007820000-0x0000000007835000-memory.dmp

memory/3596-46-0x0000000007920000-0x000000000793A000-memory.dmp

memory/3596-47-0x0000000007900000-0x0000000007908000-memory.dmp

memory/3596-50-0x0000000074010000-0x00000000747C1000-memory.dmp

memory/1344-52-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/1344-54-0x0000000004250000-0x0000000004B3B000-memory.dmp

memory/572-53-0x0000000003C10000-0x0000000004010000-memory.dmp

memory/572-55-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/3136-62-0x0000000005F50000-0x00000000062A7000-memory.dmp

memory/3136-67-0x0000000005170000-0x0000000005180000-memory.dmp

memory/3136-63-0x0000000005170000-0x0000000005180000-memory.dmp

memory/3136-61-0x00000000740B0000-0x0000000074861000-memory.dmp

memory/3136-68-0x00000000064D0000-0x000000000651C000-memory.dmp

memory/3136-70-0x0000000070390000-0x00000000703DC000-memory.dmp

memory/3136-80-0x0000000007460000-0x0000000007504000-memory.dmp

memory/3136-71-0x00000000705A0000-0x00000000708F7000-memory.dmp

memory/3136-69-0x000000007FD50000-0x000000007FD60000-memory.dmp

memory/3136-81-0x00000000079B0000-0x00000000079C1000-memory.dmp

memory/3136-82-0x0000000007A00000-0x0000000007A15000-memory.dmp

memory/3136-85-0x00000000740B0000-0x0000000074861000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/1080-88-0x0000000003420000-0x0000000003430000-memory.dmp

memory/1080-87-0x00000000740B0000-0x0000000074861000-memory.dmp

memory/1080-89-0x0000000006320000-0x0000000006677000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0c1e218ed911c3c96bc70e725436acef
SHA1 d401de11708a04f6233069f481690ecc3580c26d
SHA256 cbb25b41aef8f62a57449282442f821e14777fbc904b79757d704e856e35e482
SHA512 5653eb7aad9b3b762af7e4cea065674fefb86e82029e3ca77bba5eb20dcef3278e0986353cdd5d80311998e100068813a363897c29339423a90b5f54d4ee8c3e

memory/1080-100-0x0000000070390000-0x00000000703DC000-memory.dmp

memory/1080-99-0x000000007FDA0000-0x000000007FDB0000-memory.dmp

memory/1080-101-0x00000000705E0000-0x0000000070937000-memory.dmp

memory/1080-111-0x00000000740B0000-0x0000000074861000-memory.dmp

memory/572-112-0x0000000003C10000-0x0000000004010000-memory.dmp

memory/3484-122-0x00000000740B0000-0x0000000074861000-memory.dmp

memory/3484-121-0x0000000005700000-0x0000000005A57000-memory.dmp

memory/3484-123-0x0000000002900000-0x0000000002910000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 52cc92dc859bad8c8fd0df40e80c6f60
SHA1 e23ca8a7e17acacf52cbbc2692ee4fbb671ade61
SHA256 31f3fd70038bafd6a0a7013b8a85becd50a9414151415c2408e9a64c08f02552
SHA512 03ec5e6be04d9c723c14c4b4f5c43520b722492c44ca9323d53d344f70c73ad9d25b212a742100ff57239b8367c766d870c6430b27cb8ad99a193d9f42d014b6

memory/3484-124-0x0000000002900000-0x0000000002910000-memory.dmp

memory/3484-126-0x0000000070390000-0x00000000703DC000-memory.dmp

memory/3484-127-0x0000000070510000-0x0000000070867000-memory.dmp

memory/3484-138-0x0000000002900000-0x0000000002910000-memory.dmp

memory/3484-137-0x000000007F360000-0x000000007F370000-memory.dmp

memory/572-136-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d08a89716dfc10241358be5cd12c12c7
SHA1 a1499b609197316bef4200c25969d105a231896d
SHA256 07facf9e00672d2658749188db1a1998dfdf74e5810ac00c845e0ce83ecd9b14
SHA512 2c0dbc61276c63138332722c5dccef7fa1d2ad53362d5d15b5ee4b40aa852c14085f334085d2876198b0940df9b63b4de345c5881804273d595f9481595eaf14

memory/572-147-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 05039fd654e25050a1089fe2f7773fcf
SHA1 6af6eb8194ba53f550128e5b1e6c4eea9451148f
SHA256 5133a853e3e778724efc5560a195c2ba9d0b2ee8910f3834280e7e4d95718682
SHA512 a36e79878050be3091dd864e9b2b44f61075e5dc2d63e273ba767bf0f87dcf496a83c49537c09182e580b68ef215dcc68a3f0839fac5f7bb01d20d32f826ac95

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8ecea7f06c904ebf6780cac1f83ed56a
SHA1 c33bc5f6ee672cdab9510cec9b1453b4ae105930
SHA256 635eace6c3e528fec75f94abce5c6628e37421385d00624a78935630f0a2cebd
SHA512 23dbaeb679f320ef68c8ed238be67f321b7434cbac4356f70e825f948827f06b6413ae8324295742abdd32e4773704767f6ea3859e8ccfc94fe870d89a0d97d2

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 606b74228c1c7b9b95fd283e4e36b322
SHA1 3ffa5d6923b7b841ecf883e5c0d4eb6e24477e68
SHA256 84bd95f74beb6617042d07b85fa7803695d2372345c91586feb8553dca3bb9da
SHA512 c5099c3f8600c831a9ed92238ba271229912febedc83a095a8a2256881ff9de723b79821cfafc562a13ae3668cb9a528f0c0e02d1c73b2684e59f512ce74b382

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2892-242-0x0000000000400000-0x0000000001E06000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3812-249-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2892-251-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/976-252-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2892-253-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-255-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/976-256-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2892-257-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-259-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-261-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-263-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-265-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-267-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-269-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-271-0x0000000000400000-0x0000000001E06000-memory.dmp

memory/2892-273-0x0000000000400000-0x0000000001E06000-memory.dmp