Malware Analysis Report

2025-01-02 06:40

Sample ID 240515-sy2njsfh2x
Target 7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd
SHA256 7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd

Threat Level: Known bad

The file 7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Drops file in Windows directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Command and Scripting Interpreter: PowerShell

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 15:32

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 15:32

Reported

2024-05-15 15:35

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1372 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1372 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1372 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\system32\cmd.exe
PID 392 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\system32\cmd.exe
PID 4560 wrote to memory of 3176 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4560 wrote to memory of 3176 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 392 wrote to memory of 2060 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 2060 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 2060 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 392 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 392 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 392 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 1588 wrote to memory of 4900 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 4900 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 4900 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 1592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 1592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 1592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 4576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 4576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 4576 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1588 wrote to memory of 972 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1588 wrote to memory of 972 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3632 wrote to memory of 2052 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3632 wrote to memory of 2052 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3632 wrote to memory of 2052 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2052 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2052 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2052 wrote to memory of 4656 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 100.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 5236577f-d2b4-4ca2-b618-53adb782d641.uuid.alldatadump.org udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 server12.alldatadump.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server12.alldatadump.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
BG 185.82.216.108:443 server12.alldatadump.org tcp
BG 185.82.216.108:443 server12.alldatadump.org tcp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.178.89.13.in-addr.arpa udp

Files

memory/1372-1-0x00000000047B0000-0x0000000004BAA000-memory.dmp

memory/1372-2-0x0000000004BB0000-0x000000000549B000-memory.dmp

memory/1372-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/456-4-0x000000007425E000-0x000000007425F000-memory.dmp

memory/456-5-0x0000000000E20000-0x0000000000E56000-memory.dmp

memory/456-6-0x0000000004DC0000-0x00000000053E8000-memory.dmp

memory/456-7-0x0000000074250000-0x0000000074A00000-memory.dmp

memory/456-8-0x0000000074250000-0x0000000074A00000-memory.dmp

memory/456-9-0x0000000004CC0000-0x0000000004CE2000-memory.dmp

memory/456-11-0x0000000005580000-0x00000000055E6000-memory.dmp

memory/456-10-0x00000000054A0000-0x0000000005506000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5p3z3kup.4sj.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/456-21-0x00000000056F0000-0x0000000005A44000-memory.dmp

memory/456-22-0x0000000005B70000-0x0000000005B8E000-memory.dmp

memory/456-23-0x0000000005BB0000-0x0000000005BFC000-memory.dmp

memory/456-24-0x00000000060F0000-0x0000000006134000-memory.dmp

memory/456-25-0x0000000006EB0000-0x0000000006F26000-memory.dmp

memory/456-26-0x00000000075B0000-0x0000000007C2A000-memory.dmp

memory/456-27-0x0000000006F50000-0x0000000006F6A000-memory.dmp

memory/1372-28-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/456-29-0x0000000007100000-0x0000000007132000-memory.dmp

memory/456-32-0x0000000070270000-0x00000000705C4000-memory.dmp

memory/456-31-0x0000000074250000-0x0000000074A00000-memory.dmp

memory/456-30-0x00000000700F0000-0x000000007013C000-memory.dmp

memory/456-42-0x0000000007140000-0x000000000715E000-memory.dmp

memory/456-43-0x0000000007160000-0x0000000007203000-memory.dmp

memory/456-44-0x0000000074250000-0x0000000074A00000-memory.dmp

memory/456-45-0x0000000007250000-0x000000000725A000-memory.dmp

memory/456-46-0x0000000007310000-0x00000000073A6000-memory.dmp

memory/456-47-0x0000000007270000-0x0000000007281000-memory.dmp

memory/456-48-0x00000000072B0000-0x00000000072BE000-memory.dmp

memory/456-49-0x00000000072C0000-0x00000000072D4000-memory.dmp

memory/456-50-0x00000000073B0000-0x00000000073CA000-memory.dmp

memory/456-51-0x0000000007300000-0x0000000007308000-memory.dmp

memory/456-54-0x0000000074250000-0x0000000074A00000-memory.dmp

memory/1372-57-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1372-58-0x0000000004BB0000-0x000000000549B000-memory.dmp

memory/1372-55-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/5036-68-0x0000000006420000-0x0000000006774000-memory.dmp

memory/5036-69-0x00000000068E0000-0x000000000692C000-memory.dmp

memory/5036-70-0x00000000701F0000-0x000000007023C000-memory.dmp

memory/5036-71-0x0000000070370000-0x00000000706C4000-memory.dmp

memory/5036-81-0x0000000007A70000-0x0000000007B13000-memory.dmp

memory/5036-82-0x0000000007DA0000-0x0000000007DB1000-memory.dmp

memory/5036-84-0x0000000007DF0000-0x0000000007E04000-memory.dmp

memory/392-83-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/2060-88-0x0000000006110000-0x0000000006464000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 bb343ab691ae70c1a3a85dc9d861bc91
SHA1 1c248b6da2f6706f3b50b9987d2115dc66174f4e
SHA256 39e8feb8b69499e6ec60b78273b441fbbf4eb3a1438ab67dad9afad47544cf71
SHA512 30ee75062768c898d98617ed81c69650e7f09d353bb5f70204a37c2fd0411cdef80b453b50df271e2dc6e572a29ae73b8784a655941c73e45fe0119a19a340ed

memory/2060-99-0x00000000701F0000-0x000000007023C000-memory.dmp

memory/2060-100-0x0000000070990000-0x0000000070CE4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 302d7f6bce2b0502ce77aac3161269fe
SHA1 003355d2e5ac396e4969f7a4b0d7581e15794ec9
SHA256 096b9063d9946e9cf7aa7cef335041112659b79ab544c7e66e50beafcbbd06c1
SHA512 4d8f74ebd0e34d38f0242f0e28b166afa62ae5815732bb8bcc7ef69aaf78f4780e04547dedea736f0f9988bde9d50db14f8bab7e7addc24adae5d6c382c1c39b

memory/2284-121-0x00000000701F0000-0x000000007023C000-memory.dmp

memory/2284-122-0x0000000070370000-0x00000000706C4000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 afd47a33de2da8e263b61cd5fc4f5540
SHA1 783e8ca1be0eacb2af0d526a197108e84d664eab
SHA256 7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd
SHA512 355cad347309eece9b86f901e26959ccb9b6f59e4f7956f577eaf02854405ee8159fba331290afb18cc4a92e8e1df42daec92c780617ea53e9b6ba3366a67ce5

memory/392-136-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4900-148-0x0000000005FE0000-0x0000000006334000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e1be5bb1e3877ce124bfc0a53e2271cc
SHA1 ffd976d6cdadbb73d5d931b1622561516e59a4fd
SHA256 3301ec7e79d646033b5182b946aa46d1f47ad00ca08e9e97c198b22c3079864a
SHA512 bb33f8f00e7b09d20cd01c7146fa922132d4549e0a99fcf1c2097e5c61982eda6c72703ca2d9d484ab8a6f99a5968f37255d37492c6428155d6c5bf4d9a3ee10

memory/4900-150-0x00000000069E0000-0x0000000006A2C000-memory.dmp

memory/4900-152-0x00000000702F0000-0x0000000070644000-memory.dmp

memory/4900-151-0x0000000070150000-0x000000007019C000-memory.dmp

memory/4900-162-0x0000000007730000-0x00000000077D3000-memory.dmp

memory/4900-163-0x0000000007A80000-0x0000000007A91000-memory.dmp

memory/1588-164-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4900-165-0x0000000005D10000-0x0000000005D24000-memory.dmp

memory/1592-176-0x0000000005F50000-0x00000000062A4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 49aab7e1661a1abed269c57c80531a2f
SHA1 7d35d9a08ba948d874363a02fd7249672b06dae3
SHA256 5a0b2926fe2e5eb8ff9d4a3788377e7614e6efc78eb94c3c07ea5c07b21c8bde
SHA512 3d4add0541c8d0b6e42556853a1da6798a9eabcff8880fc1e263d48237c55d409446e2a2c234dd27dd5a39d66922b250442a727785528998408629fdc324c1ce

memory/1592-178-0x00000000065C0000-0x000000000660C000-memory.dmp

memory/1592-179-0x0000000070070000-0x00000000700BC000-memory.dmp

memory/1592-180-0x00000000701F0000-0x0000000070544000-memory.dmp

memory/1592-190-0x0000000007600000-0x00000000076A3000-memory.dmp

memory/1592-191-0x0000000005E50000-0x0000000005E61000-memory.dmp

memory/1592-192-0x0000000005E90000-0x0000000005EA4000-memory.dmp

memory/4576-203-0x00000000054E0000-0x0000000005834000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8912132957ce0d1c36f1472f4779893e
SHA1 7fe77cb2595e2519331bba39640afc2f1647ad8f
SHA256 ab1f68cf63f99233c70ff8f3e0a7c1a8c4e71bd2b9910546830162fcb1b92816
SHA512 774717ca09a3fcfa5c2dfac1374fcc8c5c95e657139f987f432f5717e824b41d02cace4a3a914b10778377bb030168f415934d4ac78a08dfd11faa69d2e8112d

memory/4576-205-0x0000000070070000-0x00000000700BC000-memory.dmp

memory/4576-206-0x0000000070820000-0x0000000070B74000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/1588-222-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3632-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3116-229-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3632-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1588-232-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3116-234-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1588-233-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-236-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3116-237-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1588-238-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-240-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-241-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-244-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-246-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1588-248-0x0000000000400000-0x0000000002B0B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 15:32

Reported

2024-05-15 15:35

Platform

win11-20240508-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2664 wrote to memory of 4652 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2664 wrote to memory of 4652 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2664 wrote to memory of 4652 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 996 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 996 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 996 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 620 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\system32\cmd.exe
PID 3504 wrote to memory of 620 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\system32\cmd.exe
PID 620 wrote to memory of 5092 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 620 wrote to memory of 5092 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3504 wrote to memory of 3256 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 3256 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 3256 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3504 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 3504 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 3504 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe C:\Windows\rss\csrss.exe
PID 2288 wrote to memory of 4912 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 4912 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 4912 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 436 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 436 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 436 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 2568 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 2568 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 2568 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 3140 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2288 wrote to memory of 3140 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4336 wrote to memory of 1144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4336 wrote to memory of 1144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4336 wrote to memory of 1144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1144 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1144 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1144 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe

"C:\Users\Admin\AppData\Local\Temp\7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server16.alldatadump.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
BG 185.82.216.108:443 server16.alldatadump.org tcp
BG 185.82.216.108:443 server16.alldatadump.org tcp

Files

memory/2664-1-0x0000000004920000-0x0000000004D24000-memory.dmp

memory/2664-2-0x0000000004D30000-0x000000000561B000-memory.dmp

memory/2664-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4652-4-0x000000007453E000-0x000000007453F000-memory.dmp

memory/4652-5-0x00000000032F0000-0x0000000003326000-memory.dmp

memory/4652-7-0x0000000074530000-0x0000000074CE1000-memory.dmp

memory/4652-6-0x0000000005B80000-0x00000000061AA000-memory.dmp

memory/4652-8-0x0000000005930000-0x0000000005952000-memory.dmp

memory/4652-9-0x0000000005AD0000-0x0000000005B36000-memory.dmp

memory/4652-10-0x00000000062A0000-0x0000000006306000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cbhzlgnq.ddp.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4652-20-0x0000000074530000-0x0000000074CE1000-memory.dmp

memory/4652-19-0x0000000006310000-0x0000000006667000-memory.dmp

memory/4652-22-0x00000000067F0000-0x000000000680E000-memory.dmp

memory/4652-23-0x0000000006820000-0x000000000686C000-memory.dmp

memory/2664-21-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4652-24-0x0000000006D40000-0x0000000006D86000-memory.dmp

memory/4652-26-0x00000000707A0000-0x00000000707EC000-memory.dmp

memory/4652-38-0x0000000007C60000-0x0000000007D04000-memory.dmp

memory/4652-36-0x0000000074530000-0x0000000074CE1000-memory.dmp

memory/4652-37-0x0000000007C40000-0x0000000007C5E000-memory.dmp

memory/4652-27-0x0000000070930000-0x0000000070C87000-memory.dmp

memory/4652-25-0x0000000007BE0000-0x0000000007C14000-memory.dmp

memory/4652-40-0x00000000083D0000-0x0000000008A4A000-memory.dmp

memory/4652-39-0x0000000074530000-0x0000000074CE1000-memory.dmp

memory/4652-41-0x0000000007D80000-0x0000000007D9A000-memory.dmp

memory/4652-42-0x0000000007DC0000-0x0000000007DCA000-memory.dmp

memory/4652-43-0x0000000007E80000-0x0000000007F16000-memory.dmp

memory/4652-44-0x0000000007DF0000-0x0000000007E01000-memory.dmp

memory/4652-45-0x0000000007E30000-0x0000000007E3E000-memory.dmp

memory/4652-46-0x0000000007E40000-0x0000000007E55000-memory.dmp

memory/4652-47-0x0000000007F40000-0x0000000007F5A000-memory.dmp

memory/4652-48-0x0000000007E70000-0x0000000007E78000-memory.dmp

memory/4652-51-0x0000000074530000-0x0000000074CE1000-memory.dmp

memory/2664-54-0x0000000004920000-0x0000000004D24000-memory.dmp

memory/2664-55-0x0000000004D30000-0x000000000561B000-memory.dmp

memory/2664-53-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/996-56-0x0000000005650000-0x00000000059A7000-memory.dmp

memory/996-65-0x00000000707A0000-0x00000000707EC000-memory.dmp

memory/996-66-0x00000000709F0000-0x0000000070D47000-memory.dmp

memory/996-75-0x0000000006DB0000-0x0000000006E54000-memory.dmp

memory/996-76-0x0000000007100000-0x0000000007111000-memory.dmp

memory/2664-78-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3504-77-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/996-79-0x0000000007150000-0x0000000007165000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 2516b80cbe2b03c03b3e7fe0629ae063
SHA1 a5fce9bfd59753c728b2f90de93cdc89329d91fa
SHA256 57389110348c1625fdc48fbcfe62690bc536cfd1f950ec5d136d1f36f26b1550
SHA512 fdf7351d0b8f28373b54539fafb1b13f631b59dcc0262fb4ff7fb19fa989c571e42d703f285fe302af598b975f951b0851aa1206cdac2dfa04bc52043fe2e52c

memory/3256-92-0x00000000707A0000-0x00000000707EC000-memory.dmp

memory/3256-93-0x00000000709F0000-0x0000000070D47000-memory.dmp

memory/4648-112-0x0000000005AA0000-0x0000000005DF7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 65eb3d2af22ff9e4823dcf486864b570
SHA1 ba43fdf773cb546139569932450eb7db74472a71
SHA256 f326b811f6c9586bf46cb951f39d33ce5fc82853118c4a44cc9ea28401279021
SHA512 ed72ccec9809bfd3f3a811f794e55e72317466674ca968826925f30841f119ea4cf81c30982b25f70547aacfd9bbc7eca575fb5330cf6d6f81207aa3d7516cb9

memory/4648-114-0x00000000707A0000-0x00000000707EC000-memory.dmp

memory/4648-115-0x0000000070920000-0x0000000070C77000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 afd47a33de2da8e263b61cd5fc4f5540
SHA1 783e8ca1be0eacb2af0d526a197108e84d664eab
SHA256 7ba934fea85abbbdfff95947d7865e2fb6d1ba116cc7872a0dad8d675b7616cd
SHA512 355cad347309eece9b86f901e26959ccb9b6f59e4f7956f577eaf02854405ee8159fba331290afb18cc4a92e8e1df42daec92c780617ea53e9b6ba3366a67ce5

memory/3504-130-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-132-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7d12fdf80dc4225cfc7bb5c343d48c21
SHA1 f79479fca9721cca445759fdf08b0e10acc2b3e5
SHA256 0ab95f6e45b9fc01051dab96a04beb497788a44de792c6aa828bd4c8c4055c88
SHA512 27f33924b337501662acbdd5188897541ff59119be736724eb58c98162efefb38f60c0f65a04337ca280c8f2d859fa40da3e5517db083a8d3a31f47ccd7cb2ca

memory/4912-143-0x0000000070920000-0x0000000070C77000-memory.dmp

memory/4912-142-0x00000000707A0000-0x00000000707EC000-memory.dmp

memory/436-161-0x00000000056C0000-0x0000000005A17000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e5de5130cd10519b17398f9dd05f53b7
SHA1 0bcb5406521533027e54b01c7173270bec12f0f9
SHA256 556fdeba9f8a6696a7c146033b2a0ef71dd4e8647a5df80884d827be6053f8a8
SHA512 16cebc20df6b815b81d8fecd2f2825156020904624362ef6d0c0fab012d1539e1f4f308354e210948b27817ec436b0227772885f3e11d09fdef9d353a44f6422

memory/436-163-0x0000000005B90000-0x0000000005BDC000-memory.dmp

memory/436-165-0x00000000706C0000-0x000000007070C000-memory.dmp

memory/436-166-0x0000000070840000-0x0000000070B97000-memory.dmp

memory/436-175-0x0000000006DB0000-0x0000000006E54000-memory.dmp

memory/436-176-0x00000000054B0000-0x00000000054C1000-memory.dmp

memory/436-177-0x0000000005600000-0x0000000005615000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6cda050d995b1210d277a42b8a033562
SHA1 ce1adfaf49cf7d18b679c6d3f67a1e7d3378c0f6
SHA256 9ae64d61cfb3e89d2be4a112fca4b293f7b18fe6bb3f1c3f169b728a940ec360
SHA512 4632201433bde64cfd5e3c95bb7ea644f0f5d97d0bbe58545589dfec09d87b33a000802ea801bce0b3d8e6b1132025b2cb240ea5394b95fe7f22b1668e3c469d

memory/2568-190-0x0000000070840000-0x0000000070B97000-memory.dmp

memory/2568-189-0x00000000706C0000-0x000000007070C000-memory.dmp

memory/2288-200-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4336-211-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4336-214-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2288-216-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1980-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2288-218-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-222-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1980-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2288-226-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-232-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-234-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/1980-239-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2288-238-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-242-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2288-248-0x0000000000400000-0x0000000002B0B000-memory.dmp