Malware Analysis Report

2025-01-02 06:39

Sample ID 240515-3q76gaae82
Target 1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3
SHA256 1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3

Threat Level: Known bad

The file 1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Checks for VirtualBox DLLs, possible anti-VM trick

Launches sc.exe

Drops file in Windows directory

Command and Scripting Interpreter: PowerShell

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 23:44

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 23:44

Reported

2024-05-15 23:46

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1276 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1276 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1276 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3200 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\system32\cmd.exe
PID 3604 wrote to memory of 3200 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\system32\cmd.exe
PID 3200 wrote to memory of 1360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3200 wrote to memory of 1360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3604 wrote to memory of 4320 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4320 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4320 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 3604 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 3604 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 4944 wrote to memory of 3884 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 3884 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 3884 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2784 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2784 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2784 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2752 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2752 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2752 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4944 wrote to memory of 2236 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4944 wrote to memory of 2236 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3844 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3844 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3844 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3316 wrote to memory of 4468 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3316 wrote to memory of 4468 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3316 wrote to memory of 4468 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 52d63998-31d2-441f-b3ec-e043414d7caa.uuid.dumppage.org udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 stun4.l.google.com udp
US 8.8.8.8:53 server5.dumppage.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.111:443 server5.dumppage.org tcp
US 74.125.250.129:19302 stun4.l.google.com udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 111.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 52.111.229.43:443 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
BG 185.82.216.111:443 server5.dumppage.org tcp

Files

memory/1276-1-0x0000000004750000-0x0000000004B57000-memory.dmp

memory/1276-2-0x0000000004B60000-0x000000000544B000-memory.dmp

memory/1276-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4916-4-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

memory/4916-5-0x0000000002E10000-0x0000000002E46000-memory.dmp

memory/4916-7-0x00000000055F0000-0x0000000005C18000-memory.dmp

memory/1276-6-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4916-8-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/4916-9-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/4916-10-0x0000000005580000-0x00000000055A2000-memory.dmp

memory/4916-11-0x0000000005D10000-0x0000000005D76000-memory.dmp

memory/4916-12-0x0000000005DF0000-0x0000000005E56000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wr5bfpwx.gii.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4916-22-0x0000000005E60000-0x00000000061B4000-memory.dmp

memory/4916-23-0x0000000005DB0000-0x0000000005DCE000-memory.dmp

memory/4916-24-0x0000000006470000-0x00000000064BC000-memory.dmp

memory/4916-25-0x0000000006970000-0x00000000069B4000-memory.dmp

memory/4916-26-0x0000000007520000-0x0000000007596000-memory.dmp

memory/4916-27-0x0000000007E20000-0x000000000849A000-memory.dmp

memory/4916-28-0x00000000077C0000-0x00000000077DA000-memory.dmp

memory/4916-29-0x0000000007980000-0x00000000079B2000-memory.dmp

memory/4916-31-0x00000000710E0000-0x0000000071434000-memory.dmp

memory/4916-30-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/4916-43-0x00000000079E0000-0x0000000007A83000-memory.dmp

memory/4916-44-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/4916-42-0x00000000079C0000-0x00000000079DE000-memory.dmp

memory/4916-41-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/4916-45-0x0000000007AD0000-0x0000000007ADA000-memory.dmp

memory/4916-47-0x0000000007BE0000-0x0000000007C76000-memory.dmp

memory/4916-46-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/4916-48-0x0000000007AE0000-0x0000000007AF1000-memory.dmp

memory/4916-49-0x0000000007B20000-0x0000000007B2E000-memory.dmp

memory/4916-50-0x0000000007B40000-0x0000000007B54000-memory.dmp

memory/4916-51-0x0000000007B90000-0x0000000007BAA000-memory.dmp

memory/4916-52-0x0000000007B80000-0x0000000007B88000-memory.dmp

memory/4916-55-0x0000000074AE0000-0x0000000075290000-memory.dmp

memory/1276-57-0x0000000004750000-0x0000000004B57000-memory.dmp

memory/1276-58-0x0000000004B60000-0x000000000544B000-memory.dmp

memory/1276-59-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1276-60-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1088-67-0x0000000006240000-0x0000000006594000-memory.dmp

memory/1088-71-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/1088-72-0x0000000070B20000-0x0000000070E74000-memory.dmp

memory/1088-83-0x0000000007B10000-0x0000000007BB3000-memory.dmp

memory/3604-82-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1088-84-0x0000000007E10000-0x0000000007E21000-memory.dmp

memory/1088-85-0x0000000007E80000-0x0000000007E94000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 3d086a433708053f9bf9523e1d87a4e8
SHA1 b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA256 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

memory/4320-99-0x0000000005670000-0x00000000059C4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0ae4ec98fb9d42ee562aa52478ce2b83
SHA1 ce69233e10b71e0382a1b1e2deb0f483b1dc7e51
SHA256 6c57ea1da3111b14128a61d767aeb8dcc9bda0cce6e938768c95d85c336dff2c
SHA512 cff04b595081f49b27d20e266444739ff1facccc30039bd6c65d2e70809044ac473d2f464993e7027fd7c92f980187640ac66e84466ad87aec32c6299c1086a4

memory/4320-101-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/4320-102-0x0000000070B00000-0x0000000070E54000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c60e706e2b69c4340156318c341ee35d
SHA1 4c6cc04b13f5552f06cedab118c1f4b27224507a
SHA256 981d5db4f8a205a57f332e75f12b5e1d7127736b3edea74cd6f337e80da64d75
SHA512 916e6a324d820449f5f50e9b6e137255c93548077b3038803440a981d59d0334a9bcdd295fdb8a6439668ba621fea3b97957c442a738d67ea65969733c721db0

memory/3780-123-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/3780-124-0x0000000070B00000-0x0000000070E54000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 a16a201242055d3ac517261dc65da1e5
SHA1 58e2775530d3c78349cfc1bd8710010eb83f1ef2
SHA256 1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3
SHA512 221b244f995b1136f58563b2924bbc054516dd90d5739221a9eb67ede4a97f3775c4a6670303ff25ca2dff244d76886166e13bf2508ef4aa3f4595fbaf6eaea0

memory/3604-138-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f9a958475ec40213ac802b11aad08b1c
SHA1 7895021c920f0bdfbcff75a679bc781095d51ca8
SHA256 94a324d687b5b62b5f245401ed46d2f5596c26cb078f515e51f63460211f1221
SHA512 0514ba2108567c1f47feb80f1e96d391bb0659adfe3a375a1dd490494c3fc16908e60912a94910f1c0517f0aaed670ad05774543eba8f449603de39f1dac2ac5

memory/3884-152-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/3884-153-0x0000000070B00000-0x0000000070E54000-memory.dmp

memory/4944-163-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2784-174-0x0000000005670000-0x00000000059C4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8d2c56efd59834788e63871dc107597d
SHA1 f6da8e71a775c079963db058b17b766735c0198c
SHA256 e8857ac9d72a6ecb5d5000ab66942b9663beb3a9335b25ede8491ec50d30a16f
SHA512 14f6451be67c764134aff3408bd1b57ac1e0a8fbd0c3972e6e61b75201bdc6fa3f5d2066a6d848f7df264f8ebea3a3e8b1e09f0a4f9b63238594174788904889

memory/2784-176-0x00000000060D0000-0x000000000611C000-memory.dmp

memory/2784-177-0x00000000708A0000-0x00000000708EC000-memory.dmp

memory/2784-178-0x0000000070A30000-0x0000000070D84000-memory.dmp

memory/2784-188-0x0000000006E20000-0x0000000006EC3000-memory.dmp

memory/2784-189-0x00000000055B0000-0x00000000055C1000-memory.dmp

memory/2784-191-0x00000000059D0000-0x00000000059E4000-memory.dmp

memory/2752-202-0x0000000006400000-0x0000000006754000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e2425a8c53cce2072913a1bfd3b13eab
SHA1 6e61243c791832d91adbf0084a00fbdca7e61df7
SHA256 bc5b1d0c1707e11a10bacd51dcfb9388927309049e23ad046d731db56c0fa8c8
SHA512 4e51d0e1f0f53dc2aa9fffbdeb4b4723e95103b4079eee653fbbbaa1d41fdd07a1ce6af2105c116bcde43261f5adb5ae82aa8eb94e7b8400c82cfd4f0b467476

memory/2752-204-0x00000000708A0000-0x00000000708EC000-memory.dmp

memory/2752-205-0x0000000070A20000-0x0000000070D74000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4944-221-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3844-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3676-229-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3844-230-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4944-231-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3676-234-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4944-233-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4944-236-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3676-239-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4944-240-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4944-243-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4944-245-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3676-249-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4944-248-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4944-252-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4944-255-0x0000000000400000-0x0000000002B0B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 23:44

Reported

2024-05-15 23:46

Platform

win11-20240508-en

Max time kernel

150s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1388 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1388 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1388 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 3736 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\system32\cmd.exe
PID 3832 wrote to memory of 3736 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\system32\cmd.exe
PID 3736 wrote to memory of 2896 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3736 wrote to memory of 2896 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3832 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 3832 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 3832 wrote to memory of 4884 N/A C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe C:\Windows\rss\csrss.exe
PID 4884 wrote to memory of 4560 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 4560 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 4560 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 1624 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 1624 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 1624 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 2192 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 2192 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 2192 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4884 wrote to memory of 4272 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4884 wrote to memory of 4272 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 5036 wrote to memory of 4944 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5036 wrote to memory of 4944 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5036 wrote to memory of 4944 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4944 wrote to memory of 4948 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4944 wrote to memory of 4948 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4944 wrote to memory of 4948 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe

"C:\Users\Admin\AppData\Local\Temp\1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 0c54254b-5123-40a4-95a3-30d2af64d944.uuid.dumppage.org udp
US 8.8.8.8:53 server4.dumppage.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.111:443 server4.dumppage.org tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 172.67.221.71:443 carsalessystem.com tcp
US 52.111.227.14:443 tcp

Files

memory/1388-1-0x00000000048D0000-0x0000000004CD4000-memory.dmp

memory/1388-2-0x0000000004CE0000-0x00000000055CB000-memory.dmp

memory/1388-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2916-4-0x000000007408E000-0x000000007408F000-memory.dmp

memory/2916-5-0x00000000028B0000-0x00000000028E6000-memory.dmp

memory/2916-6-0x0000000005140000-0x000000000576A000-memory.dmp

memory/2916-7-0x0000000074080000-0x0000000074831000-memory.dmp

memory/2916-8-0x0000000004F80000-0x0000000004FA2000-memory.dmp

memory/2916-9-0x0000000005770000-0x00000000057D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_se2wisfx.pbx.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2916-19-0x0000000074080000-0x0000000074831000-memory.dmp

memory/2916-20-0x00000000058C0000-0x0000000005C17000-memory.dmp

memory/2916-10-0x0000000005850000-0x00000000058B6000-memory.dmp

memory/2916-21-0x0000000005D20000-0x0000000005D3E000-memory.dmp

memory/2916-22-0x0000000005D80000-0x0000000005DCC000-memory.dmp

memory/2916-23-0x0000000006290000-0x00000000062D6000-memory.dmp

memory/2916-26-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/2916-25-0x0000000007140000-0x0000000007174000-memory.dmp

memory/2916-27-0x0000000070470000-0x00000000707C7000-memory.dmp

memory/1388-24-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2916-38-0x0000000074080000-0x0000000074831000-memory.dmp

memory/2916-37-0x00000000071C0000-0x0000000007264000-memory.dmp

memory/2916-36-0x00000000071A0000-0x00000000071BE000-memory.dmp

memory/2916-39-0x0000000074080000-0x0000000074831000-memory.dmp

memory/2916-40-0x0000000007930000-0x0000000007FAA000-memory.dmp

memory/2916-41-0x00000000072E0000-0x00000000072FA000-memory.dmp

memory/2916-42-0x0000000007320000-0x000000000732A000-memory.dmp

memory/2916-43-0x0000000007430000-0x00000000074C6000-memory.dmp

memory/2916-44-0x0000000007350000-0x0000000007361000-memory.dmp

memory/2916-45-0x0000000007390000-0x000000000739E000-memory.dmp

memory/2916-46-0x00000000073A0000-0x00000000073B5000-memory.dmp

memory/2916-47-0x00000000073F0000-0x000000000740A000-memory.dmp

memory/2916-48-0x0000000007410000-0x0000000007418000-memory.dmp

memory/2916-51-0x0000000074080000-0x0000000074831000-memory.dmp

memory/1388-53-0x00000000048D0000-0x0000000004CD4000-memory.dmp

memory/1388-54-0x0000000004CE0000-0x00000000055CB000-memory.dmp

memory/1388-55-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1388-56-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4724-65-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/4724-66-0x0000000070470000-0x00000000707C7000-memory.dmp

memory/4724-75-0x0000000007310000-0x00000000073B4000-memory.dmp

memory/4724-76-0x0000000007640000-0x0000000007651000-memory.dmp

memory/3832-77-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4724-78-0x0000000007690000-0x00000000076A5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/3368-87-0x00000000061B0000-0x0000000006507000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ad7414bf1bc70390f67e2cc0b30a3a29
SHA1 4cf5e79e4bc12d85c46d53340d446f6c0862dc57
SHA256 a3bb3e5dc6b8ce0a1e4a05b27d4bc64f5e7d037bdfd42e7fdc536a95eaa1a90c
SHA512 7ae29ff399643fa8d2987579b9e3238f2b689fbc987c6e1c2ee7799686c36051ea5f923905a070ee096ce316014c650a1c7f45bdc1621b101c581a8751f63ed9

memory/3368-93-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/3368-94-0x0000000070540000-0x0000000070897000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 40d4c094b707e9e6896e25388f504395
SHA1 a6889ff739cddefd2a5706593cbb552752fad9f1
SHA256 32b8c5500c7d27d880bceec1a44b5074c3103bc53e800d8ffba1dd3a0205b3d0
SHA512 57ef2bd3f6084621aff6f18bcc10c29affac48fba31068edf20d06992754c4594403cfcbd6647c1fdd27e1e7a34740b787fa5efa2b685f7b9ff5a8ef809ff188

memory/1704-113-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/1704-114-0x0000000070470000-0x00000000707C7000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 a16a201242055d3ac517261dc65da1e5
SHA1 58e2775530d3c78349cfc1bd8710010eb83f1ef2
SHA256 1917ed8ef0b080f3f8969bacfcd347e8ec3693d3f01545444037ec03a8d1bff3
SHA512 221b244f995b1136f58563b2924bbc054516dd90d5739221a9eb67ede4a97f3775c4a6670303ff25ca2dff244d76886166e13bf2508ef4aa3f4595fbaf6eaea0

memory/3832-127-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 412365501b981ed41411db26bfa569be
SHA1 7cbff04c2394047f465d7fd647da5824f5d9b05a
SHA256 9b73ddf20e176d6c886d6a4532428b4bf66de6674fd9c88b5734897d725b55a0
SHA512 954c6bda467cb0d78364ed9563e263e65cbd04a2a136765584102a2fddb75b128133cd2e0ba80d6219476b109cd0fef115cbb771e0933733e7a80d498cd76058

memory/4560-140-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/4560-141-0x0000000070470000-0x00000000707C7000-memory.dmp

memory/1624-159-0x0000000005E50000-0x00000000061A7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5855f31a38bbfed01e5723277a853973
SHA1 769743c8995cf0cb0d54e0bdcd52c25f7a611500
SHA256 4829d3a799cf0749ca28b722b365bdd0d283b9dcfa5d337205ff619cc53f998c
SHA512 3aab9204ec5c786bdb53a5a436914b90813f301bf4b4a96f3d3e04e7d0a815fe237a7d583f720e525f2b3359442ee544a4c4edf26fd73c9ded710bc10c9cc92f

memory/1624-161-0x0000000006360000-0x00000000063AC000-memory.dmp

memory/1624-162-0x0000000070210000-0x000000007025C000-memory.dmp

memory/1624-163-0x0000000070390000-0x00000000706E7000-memory.dmp

memory/1624-172-0x0000000007550000-0x00000000075F4000-memory.dmp

memory/1624-173-0x00000000078D0000-0x00000000078E1000-memory.dmp

memory/1624-174-0x0000000005DC0000-0x0000000005DD5000-memory.dmp

memory/2192-177-0x0000000006210000-0x0000000006567000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 eaf1fb5aea46cab83158333bb5f01269
SHA1 ac72a6dd5ec907f29fce8ace2300a70a42cdc5e2
SHA256 4e0ee582d7e9b978dd2928cfd3eb1c0f915ffa8c79e919e5ee814b7dd213adf3
SHA512 767a43bfa82fe09da1e95988e4e81344fd061cd2d2c7a9498efeba85cba23122628496f5b3686b1c85a898bbbf80462d7034b7a86f0531477b5988fb643d67e4

memory/2192-187-0x0000000070210000-0x000000007025C000-memory.dmp

memory/2192-188-0x0000000070460000-0x00000000707B7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4884-203-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/5036-208-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5036-212-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4884-213-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3940-216-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4884-215-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-218-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3940-222-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4884-221-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-225-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-227-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-230-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-233-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4884-237-0x0000000000400000-0x0000000002B0B000-memory.dmp