Malware Analysis Report

2025-01-02 06:36

Sample ID 240515-3trb5aag27
Target 2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca
SHA256 2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca

Threat Level: Known bad

The file 2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

UPX packed file

Executes dropped EXE

Checks installed software on the system

Manipulates WinMonFS driver.

Adds Run key to start application

Drops file in System32 directory

Launches sc.exe

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Command and Scripting Interpreter: PowerShell

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 23:48

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 23:48

Reported

2024-05-15 23:51

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4532 wrote to memory of 720 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4532 wrote to memory of 720 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4532 wrote to memory of 720 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 5056 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\system32\cmd.exe
PID 3144 wrote to memory of 5056 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\system32\cmd.exe
PID 5056 wrote to memory of 4348 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 5056 wrote to memory of 4348 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3144 wrote to memory of 4132 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 4132 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 4132 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3144 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 3144 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 3144 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 4716 wrote to memory of 636 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 636 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 636 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 2036 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 2036 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 2036 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 3136 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 3136 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 3136 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4716 wrote to memory of 3716 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4716 wrote to memory of 3716 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 5052 wrote to memory of 4876 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5052 wrote to memory of 4876 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5052 wrote to memory of 4876 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4876 wrote to memory of 2652 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4876 wrote to memory of 2652 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4876 wrote to memory of 2652 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 20f933f7-b717-42e1-9cc2-7b2c2f8019fa.uuid.allstatsin.ru udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 stun.l.google.com udp
US 8.8.8.8:53 server12.allstatsin.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server12.allstatsin.ru tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 74.125.250.129:19302 stun.l.google.com udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 104.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
BG 185.82.216.104:443 server12.allstatsin.ru tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.178.89.13.in-addr.arpa udp
BG 185.82.216.104:443 server12.allstatsin.ru tcp

Files

memory/4532-1-0x00000000046B0000-0x0000000004AAE000-memory.dmp

memory/4532-2-0x0000000004BB0000-0x000000000549B000-memory.dmp

memory/4532-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/720-4-0x0000000074F5E000-0x0000000074F5F000-memory.dmp

memory/720-5-0x0000000002C30000-0x0000000002C66000-memory.dmp

memory/720-6-0x0000000074F50000-0x0000000075700000-memory.dmp

memory/720-7-0x00000000054C0000-0x0000000005AE8000-memory.dmp

memory/720-8-0x0000000005370000-0x0000000005392000-memory.dmp

memory/720-9-0x0000000005B60000-0x0000000005BC6000-memory.dmp

memory/720-10-0x0000000005BD0000-0x0000000005C36000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bgauujy3.o4t.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/720-20-0x0000000005C40000-0x0000000005F94000-memory.dmp

memory/720-21-0x0000000006220000-0x000000000623E000-memory.dmp

memory/720-22-0x0000000006270000-0x00000000062BC000-memory.dmp

memory/720-23-0x0000000007390000-0x00000000073D4000-memory.dmp

memory/720-24-0x0000000007540000-0x00000000075B6000-memory.dmp

memory/720-26-0x00000000075E0000-0x00000000075FA000-memory.dmp

memory/720-25-0x0000000007C40000-0x00000000082BA000-memory.dmp

memory/720-29-0x0000000070DF0000-0x0000000070E3C000-memory.dmp

memory/720-28-0x00000000077A0000-0x00000000077D2000-memory.dmp

memory/720-30-0x0000000070FA0000-0x00000000712F4000-memory.dmp

memory/720-41-0x0000000007800000-0x00000000078A3000-memory.dmp

memory/720-42-0x0000000074F50000-0x0000000075700000-memory.dmp

memory/720-40-0x00000000077E0000-0x00000000077FE000-memory.dmp

memory/4532-27-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/720-44-0x00000000078F0000-0x00000000078FA000-memory.dmp

memory/720-43-0x0000000074F50000-0x0000000075700000-memory.dmp

memory/720-45-0x0000000007A00000-0x0000000007A96000-memory.dmp

memory/720-46-0x0000000007900000-0x0000000007911000-memory.dmp

memory/720-47-0x0000000007940000-0x000000000794E000-memory.dmp

memory/720-48-0x0000000007960000-0x0000000007974000-memory.dmp

memory/720-50-0x00000000079A0000-0x00000000079A8000-memory.dmp

memory/720-49-0x00000000079B0000-0x00000000079CA000-memory.dmp

memory/720-53-0x0000000074F50000-0x0000000075700000-memory.dmp

memory/2836-60-0x0000000005A70000-0x0000000005DC4000-memory.dmp

memory/4532-65-0x00000000046B0000-0x0000000004AAE000-memory.dmp

memory/2836-67-0x0000000071590000-0x00000000718E4000-memory.dmp

memory/2836-77-0x00000000072A0000-0x0000000007343000-memory.dmp

memory/2836-66-0x0000000070DF0000-0x0000000070E3C000-memory.dmp

memory/2836-78-0x00000000075D0000-0x00000000075E1000-memory.dmp

memory/2836-79-0x0000000007620000-0x0000000007634000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/4132-92-0x0000000005A80000-0x0000000005DD4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 50785868d6b5a45415ddc3390c24d87b
SHA1 9b4adc8a13f7ba6f090a2c8260c76535a34b6b43
SHA256 5c9874376d72fb43d84236aeaaec4cbf98e70092babc30dfe5231abc00cddd43
SHA512 be82ec38539e30c780803cf32e4bc297f868dd3aacb47cb5e5d93a23724f7b522a9c9e2515f1e23c82b9caf9d7cbb744afdfd06732c75ef60ba95be8b5a2eadf

memory/4532-96-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4532-94-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4532-95-0x0000000004BB0000-0x000000000549B000-memory.dmp

memory/4132-98-0x0000000071570000-0x00000000718C4000-memory.dmp

memory/4132-97-0x0000000070DF0000-0x0000000070E3C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 dd84865a3bfaada88149c924aa4dc5b6
SHA1 c256526e5cf03cf77ed70aae80e54d4b8dddc20e
SHA256 8d920ce49d97fa482a30d183cd75e422b0e5d73f98337f5dd993418f762381ad
SHA512 b8198e5904e7daf1058252df546b71c31084fc6a7006b959783b9cec3cf7a352e08d216fa40cf8b187e73077c8d98f667ca5054b93d360396d41a5a05bfb387b

memory/3324-120-0x0000000071590000-0x00000000718E4000-memory.dmp

memory/3324-119-0x0000000070DF0000-0x0000000070E3C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 452f2ce29ce6785d98ef3f3f3287fdcf
SHA1 be6d58eb10696d063d92ab9ad2aa3568b38867a8
SHA256 2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca
SHA512 0ac3b8c6a4145ab8e9db8885e244c6b7d92181e11c94a39c5a5a45368e0cdbc4b02594cb08bd4426bad869803434cac75696a8c2e7e6b4a0edd3b1c4ca02ed79

memory/3144-136-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 925fb022c610c23362cc2fe5d5e16171
SHA1 1f568f37f8eed534cd47644edd8c10839ec7b3d6
SHA256 e32545b2a74331a1562a9192c44a05bd6ec53fad99bcc9f7d3831e32c7a0703d
SHA512 8ac238e5646d8e111f62c5c78ae2f7dd56ef495a238c12b33bcfb64514d080768d7866e88fcc6c9535e1e34475c07b68434c7d11720adcdb1449f2d3c32f9079

memory/636-147-0x0000000070DF0000-0x0000000070E3C000-memory.dmp

memory/636-148-0x0000000071570000-0x00000000718C4000-memory.dmp

memory/2036-168-0x0000000005680000-0x00000000059D4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cee9b0086e3bdd73dc394ed655bf273b
SHA1 a5766334e4d2b4461717e64eb64a3d357847ae42
SHA256 f86dc4afeef64d44351cffaa61b35835c529e246ca4a56a6dff40f06f265e440
SHA512 aa473566beaa8c088572c72e4831e878e8bc785b17d5344d8bb102190cef11aecb6eaf9c6107128a92fcd2073418254c2b4f2ecdde0890457acea28d27d5c100

memory/2036-170-0x0000000005B80000-0x0000000005BCC000-memory.dmp

memory/2036-173-0x0000000070E90000-0x00000000711E4000-memory.dmp

memory/2036-172-0x0000000070D10000-0x0000000070D5C000-memory.dmp

memory/2036-183-0x0000000006D70000-0x0000000006E13000-memory.dmp

memory/2036-184-0x0000000006F10000-0x0000000006F21000-memory.dmp

memory/2036-185-0x00000000055A0000-0x00000000055B4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1538c462cf26925b2482daed03045c15
SHA1 2a4503e42f391bf459972d076e590698c916ee36
SHA256 57fb3222cfe04e9f7d0fc528a4f742a197baf97e52ac49bdb50e3b40bf0b6574
SHA512 437cf4801c959b535b3f1d3c6e67dca5a889f9ce9cf51823f7c53e81a33d30889403bad1b4ece1d69122c23c0b91451278233bf598866c9c0cdb05db090528d0

memory/3136-197-0x0000000070D10000-0x0000000070D5C000-memory.dmp

memory/3136-198-0x0000000070E90000-0x00000000711E4000-memory.dmp

memory/4716-210-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/5052-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5020-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5052-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4716-227-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/5020-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4716-230-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-234-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/5020-239-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4716-238-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-242-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-247-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-250-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-254-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-258-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-263-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4716-266-0x0000000000400000-0x0000000002B0B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 23:48

Reported

2024-05-15 23:51

Platform

win11-20240508-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-162 = "Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-492 = "India Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3156 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 3724 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 3724 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 3724 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\system32\cmd.exe
PID 1472 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\system32\cmd.exe
PID 1636 wrote to memory of 4932 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1636 wrote to memory of 4932 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1472 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1472 wrote to memory of 884 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 1472 wrote to memory of 884 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 1472 wrote to memory of 884 N/A C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe C:\Windows\rss\csrss.exe
PID 884 wrote to memory of 2808 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 2808 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 2808 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 224 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 224 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 224 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 4756 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 4756 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 4756 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 884 wrote to memory of 252 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 884 wrote to memory of 252 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2992 wrote to memory of 3964 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2992 wrote to memory of 3964 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2992 wrote to memory of 3964 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3964 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3964 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3964 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe

"C:\Users\Admin\AppData\Local\Temp\2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 74afe8b5-022a-4237-853a-2b6bea177d9d.uuid.allstatsin.ru udp
US 8.8.8.8:53 server16.allstatsin.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.104:443 server16.allstatsin.ru tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun4.l.google.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.104:443 server16.allstatsin.ru tcp

Files

memory/3156-1-0x0000000004960000-0x0000000004D5B000-memory.dmp

memory/3156-2-0x0000000004D60000-0x000000000564B000-memory.dmp

memory/3156-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3832-4-0x000000007423E000-0x000000007423F000-memory.dmp

memory/3832-5-0x0000000000F20000-0x0000000000F56000-memory.dmp

memory/3832-7-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/3832-6-0x0000000004F00000-0x000000000552A000-memory.dmp

memory/3832-8-0x0000000004E00000-0x0000000004E22000-memory.dmp

memory/3832-9-0x00000000055E0000-0x0000000005646000-memory.dmp

memory/3832-10-0x0000000005650000-0x00000000056B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l2zk1qvw.3ig.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3832-20-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/3832-19-0x00000000056C0000-0x0000000005A17000-memory.dmp

memory/3832-21-0x0000000005BA0000-0x0000000005BBE000-memory.dmp

memory/3832-22-0x0000000005BF0000-0x0000000005C3C000-memory.dmp

memory/3832-23-0x00000000060E0000-0x0000000006126000-memory.dmp

memory/3832-25-0x0000000006FD0000-0x0000000007004000-memory.dmp

memory/3832-26-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/3832-27-0x0000000070630000-0x0000000070987000-memory.dmp

memory/3832-38-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/3156-24-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3832-37-0x0000000007030000-0x00000000070D4000-memory.dmp

memory/3832-36-0x0000000007010000-0x000000000702E000-memory.dmp

memory/3832-39-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/3832-40-0x00000000077A0000-0x0000000007E1A000-memory.dmp

memory/3832-41-0x0000000007160000-0x000000000717A000-memory.dmp

memory/3832-42-0x00000000071A0000-0x00000000071AA000-memory.dmp

memory/3832-43-0x00000000072B0000-0x0000000007346000-memory.dmp

memory/3832-44-0x00000000071C0000-0x00000000071D1000-memory.dmp

memory/3832-45-0x0000000007210000-0x000000000721E000-memory.dmp

memory/3832-46-0x0000000007220000-0x0000000007235000-memory.dmp

memory/3832-47-0x0000000007270000-0x000000000728A000-memory.dmp

memory/3832-48-0x0000000007250000-0x0000000007258000-memory.dmp

memory/3832-51-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/3156-53-0x0000000004960000-0x0000000004D5B000-memory.dmp

memory/3156-54-0x0000000004D60000-0x000000000564B000-memory.dmp

memory/3156-55-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3724-64-0x0000000006240000-0x0000000006597000-memory.dmp

memory/3724-65-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/3724-66-0x00000000706B0000-0x0000000070A07000-memory.dmp

memory/3724-75-0x0000000007960000-0x0000000007A04000-memory.dmp

memory/3156-76-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3724-77-0x0000000007C90000-0x0000000007CA1000-memory.dmp

memory/3724-78-0x0000000007CE0000-0x0000000007CF5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/1472-82-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1996-91-0x0000000005690000-0x00000000059E7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 11d8b2a4859b25920f1086e497f33a59
SHA1 8a17e44c2d3fdb881e502c08854226ee2a7ccc99
SHA256 b8e0fdee13b3094abba8573607c9774d8aa1760b40744a2082c8125dac3155da
SHA512 36892a1538ba580de135ab998fd9366ad13d7bccceac0776e6362d40001dba7f724d04dd73740913b9153501d023ec97643d4002c64272e3756aea91e31611c2

memory/1996-93-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/1996-94-0x0000000070620000-0x0000000070977000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 206c12cb9dceb45b4678c43a04308b78
SHA1 3786c9906ec169c478bc4e6dc6162f6a7b8c0e92
SHA256 b711ee4a8362fa9fd6ccc7855c5d63b4c20d241a945fadf11e681207cd733df5
SHA512 e02db31e69bd1243abd4b8d9fce392bae65a2b363ddb13eb6cefc6da7a3a91aafb28e0a99f79fbd66c18a0c53d29c2daca26d4aea6b28257e5d2afffe8a14981

memory/2960-114-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/2960-115-0x0000000070620000-0x0000000070977000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 452f2ce29ce6785d98ef3f3f3287fdcf
SHA1 be6d58eb10696d063d92ab9ad2aa3568b38867a8
SHA256 2eddc16aea838ab8a100e982c3e09665584018a59b9a3576dc0854ef191d46ca
SHA512 0ac3b8c6a4145ab8e9db8885e244c6b7d92181e11c94a39c5a5a45368e0cdbc4b02594cb08bd4426bad869803434cac75696a8c2e7e6b4a0edd3b1c4ca02ed79

memory/1472-130-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6cd200a1178974fa607e2550c02941f2
SHA1 98243db4b14d0d980ffc896cd6ad46bafed644d2
SHA256 693ca4d67c0fef7b4e0016726185490186ae75a6bfc7caf2c5de75ab158793c7
SHA512 18a9b7fb2623415cb9f4e625cc9382c85d848f816edccbe220a13ef2d8dae2dcbeed12bdae57cfc0c3da186ed96a542cd2d39a1973a77bb21cf558e4b66e5826

memory/2808-141-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/2808-142-0x0000000070620000-0x0000000070977000-memory.dmp

memory/224-161-0x0000000005650000-0x00000000059A7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 080f62356831dc3c975b2a7a435719d6
SHA1 44339edc95a5aaa8c4ed0b615efa0f6b7c87c0c4
SHA256 17f2eeaca5b867be993f50d89b8cef6773b0a68ac0cfc70a3c54f6131f250bea
SHA512 b4bad9c8639f3fcc72d5bc89670e12fe62538c8da04b8aa701da935da62fd38e7c5ca156a75826c47d016b41c94f0913befd71d2ff8e308e8f9f4e727a52b3fe

memory/224-163-0x0000000005C20000-0x0000000005C6C000-memory.dmp

memory/224-164-0x00000000703C0000-0x000000007040C000-memory.dmp

memory/224-165-0x0000000070540000-0x0000000070897000-memory.dmp

memory/224-174-0x0000000006E20000-0x0000000006EC4000-memory.dmp

memory/224-175-0x0000000007160000-0x0000000007171000-memory.dmp

memory/224-176-0x0000000004F10000-0x0000000004F25000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d479d3a6a176a322780b1174503d5ada
SHA1 7994043204ecae5270715910188db4e461ec6ff1
SHA256 bab88dc309b8ef8ab32bb9bec949f3da32c17a11c00c319cb3d890fcda879e9b
SHA512 f20eba959f1d381ed2107bb86381b552f3d0ac364453e84ab3a668caaab237bed513c62b91eeb24771b6226f68621411582437d90c8abe2398cbb1ff1f977915

memory/4756-188-0x00000000703C0000-0x000000007040C000-memory.dmp

memory/4756-189-0x0000000070540000-0x0000000070897000-memory.dmp

memory/884-199-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2992-210-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/884-213-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2992-215-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1952-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/884-218-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/884-222-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1952-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/884-226-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/884-230-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/884-234-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1952-239-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/884-238-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/884-242-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/884-246-0x0000000000400000-0x0000000002B0B000-memory.dmp