Analysis Overview
SHA256
2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872
Threat Level: Known bad
The file 2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872 was found to be: Known bad.
Malicious Activity Summary
Glupteba payload
Glupteba
Modifies Windows Firewall
Executes dropped EXE
UPX packed file
Adds Run key to start application
Checks installed software on the system
Manipulates WinMonFS driver.
Drops file in System32 directory
Drops file in Windows directory
Launches sc.exe
Checks for VirtualBox DLLs, possible anti-VM trick
Command and Scripting Interpreter: PowerShell
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Uses Task Scheduler COM API
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-15 18:09
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-15 18:09
Reported
2024-05-15 18:12
Platform
win10v2004-20240426-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\rss\csrss.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe | N/A |
| N/A | N/A | C:\Windows\windefender.exe | N/A |
| N/A | N/A | C:\Windows\windefender.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Windows\rss\csrss.exe | N/A |
Checks installed software on the system
Manipulates WinMonFS driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMonFS | C:\Windows\rss\csrss.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| File created | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
| File opened for modification | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe
"C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe
"C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| NL | 23.62.61.75:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.75:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 7655d100-ee9a-4569-8d83-958933e61a66.uuid.statsexplorer.org | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | stun.sipgate.net | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | server16.statsexplorer.org | udp |
| US | 3.33.249.248:3478 | stun.sipgate.net | udp |
| US | 162.159.130.233:443 | cdn.discordapp.com | tcp |
| US | 8.8.8.8:53 | 248.249.33.3.in-addr.arpa | udp |
| BG | 185.82.216.108:443 | server16.statsexplorer.org | tcp |
| US | 8.8.8.8:53 | carsalessystem.com | udp |
| US | 172.67.221.71:443 | carsalessystem.com | tcp |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| BG | 185.82.216.108:443 | server16.statsexplorer.org | tcp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| BG | 185.82.216.108:443 | server16.statsexplorer.org | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| BG | 185.82.216.108:443 | server16.statsexplorer.org | tcp |
Files
memory/4496-1-0x0000000004830000-0x0000000004C32000-memory.dmp
memory/4496-2-0x0000000004C40000-0x000000000552B000-memory.dmp
memory/4496-3-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/1600-4-0x000000007455E000-0x000000007455F000-memory.dmp
memory/1600-5-0x0000000002AE0000-0x0000000002B16000-memory.dmp
memory/1600-6-0x00000000054A0000-0x0000000005AC8000-memory.dmp
memory/1600-7-0x0000000074550000-0x0000000074D00000-memory.dmp
memory/1600-8-0x0000000074550000-0x0000000074D00000-memory.dmp
memory/1600-9-0x0000000005240000-0x0000000005262000-memory.dmp
memory/1600-11-0x0000000005410000-0x0000000005476000-memory.dmp
memory/1600-10-0x00000000053A0000-0x0000000005406000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vo5slxjh.bid.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1600-21-0x0000000005AD0000-0x0000000005E24000-memory.dmp
memory/1600-22-0x00000000060C0000-0x00000000060DE000-memory.dmp
memory/1600-23-0x0000000006170000-0x00000000061BC000-memory.dmp
memory/1600-24-0x0000000006620000-0x0000000006664000-memory.dmp
memory/1600-25-0x0000000007400000-0x0000000007476000-memory.dmp
memory/1600-27-0x0000000007480000-0x000000000749A000-memory.dmp
memory/1600-26-0x0000000007B00000-0x000000000817A000-memory.dmp
memory/1600-29-0x00000000703F0000-0x000000007043C000-memory.dmp
memory/1600-28-0x0000000007640000-0x0000000007672000-memory.dmp
memory/1600-31-0x0000000070AF0000-0x0000000070E44000-memory.dmp
memory/1600-30-0x0000000074550000-0x0000000074D00000-memory.dmp
memory/1600-41-0x0000000007680000-0x000000000769E000-memory.dmp
memory/1600-42-0x00000000076A0000-0x0000000007743000-memory.dmp
memory/1600-43-0x0000000007790000-0x000000000779A000-memory.dmp
memory/1600-44-0x0000000074550000-0x0000000074D00000-memory.dmp
memory/1600-45-0x00000000078A0000-0x0000000007936000-memory.dmp
memory/1600-46-0x00000000077A0000-0x00000000077B1000-memory.dmp
memory/1600-47-0x00000000077E0000-0x00000000077EE000-memory.dmp
memory/1600-48-0x0000000007800000-0x0000000007814000-memory.dmp
memory/1600-50-0x0000000007830000-0x0000000007838000-memory.dmp
memory/1600-49-0x0000000007840000-0x000000000785A000-memory.dmp
memory/1600-53-0x0000000074550000-0x0000000074D00000-memory.dmp
memory/4496-56-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4496-57-0x0000000004C40000-0x000000000552B000-memory.dmp
memory/4496-54-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/2668-67-0x0000000006020000-0x0000000006374000-memory.dmp
memory/2668-68-0x00000000066D0000-0x000000000671C000-memory.dmp
memory/2668-69-0x00000000704F0000-0x000000007053C000-memory.dmp
memory/2668-70-0x0000000071280000-0x00000000715D4000-memory.dmp
memory/2668-80-0x0000000007890000-0x0000000007933000-memory.dmp
memory/2668-81-0x0000000007BA0000-0x0000000007BB1000-memory.dmp
memory/2668-82-0x0000000007BF0000-0x0000000007C04000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 968cb9309758126772781b83adb8a28f |
| SHA1 | 8da30e71accf186b2ba11da1797cf67f8f78b47c |
| SHA256 | 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a |
| SHA512 | 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3 |
memory/4308-95-0x0000000005E80000-0x00000000061D4000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 4602109dc00b7d7642a2bd37a5ad1735 |
| SHA1 | bdad9bddb923656b88aa2dd1480fd8d51d290c91 |
| SHA256 | bd56774b7d444b4ce5ebab81a8624e76b04e0bf523adbd49de5aa49db35b95ba |
| SHA512 | 9f366088e1014009425ae996d888b8e5682ccd037bd0570f61430475dbd81375edf70ccbbd7748f45f79e1df87dcf2225f5f7a48e8ff151662b10fc9883e04c3 |
memory/4308-98-0x0000000070C90000-0x0000000070FE4000-memory.dmp
memory/4308-97-0x00000000704F0000-0x000000007053C000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | af37f96839380673ea65580ce478b23d |
| SHA1 | c13603a51525ca24ab09d524c3cb5acc3aedad0c |
| SHA256 | 788a3345f1d8c471a7ea604e45672ee0927617bdedc1a2eb7cf64069701ba708 |
| SHA512 | 68766b4f45e964a2e1c1c65d0281f8b6233191f7eac17cffbfe0478181f1958b128bcdf187b8951a4650dd21d35d7d987971b73e501b6f36b6088aacd6248c83 |
memory/4780-119-0x00000000704F0000-0x000000007053C000-memory.dmp
memory/4780-120-0x0000000070C90000-0x0000000070FE4000-memory.dmp
C:\Windows\rss\csrss.exe
| MD5 | b6c9cc6de33e5069f6bf72c955908590 |
| SHA1 | 3b33c0d85a14936142109152ba28070c414071dd |
| SHA256 | 2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872 |
| SHA512 | 4a63747f2b16769de4177cc508d7e765bc5f773e734c1beb6da6e4b189605d900e3667581a2d3169c95ff926c334780f5a730d11a3cbb5de8ba91b426b5948bf |
memory/2096-135-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/4496-146-0x0000000006490000-0x00000000067E4000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 29d1f400d49cd6d0e7cf0f1465ed0817 |
| SHA1 | 926d175084dae31110b3bf00bf25a5f638601901 |
| SHA256 | d95946785fae607a6bee8c382c11c8eff7f357c426222cd50892e2f365ca402f |
| SHA512 | 8591ea33b4dd3c780613ab9f70ae4ec10acc1c06be290f87cf7af205476b7bdf5f69238e6882726e0c9b0b4cc26d893103f65a840f216fe6851981c3c95c362d |
memory/4496-148-0x00000000069C0000-0x0000000006A0C000-memory.dmp
memory/4496-151-0x00000000705D0000-0x0000000070924000-memory.dmp
memory/4496-161-0x0000000007BA0000-0x0000000007C43000-memory.dmp
memory/4496-150-0x0000000070450000-0x000000007049C000-memory.dmp
memory/1848-149-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/4496-162-0x0000000007F00000-0x0000000007F11000-memory.dmp
memory/4496-163-0x00000000063C0000-0x00000000063D4000-memory.dmp
memory/2388-167-0x0000000005E00000-0x0000000006154000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | b731147be02d7f4601988080a6f01640 |
| SHA1 | bfc029540e4a86ea9b3eea61dd5454bc732caefe |
| SHA256 | 441e9e3f3a70e376dc60f20cfab220dd05e187abf2373e811f32283e7bc5c400 |
| SHA512 | bf8afb1c1b37ac33a1837ba638945ee84e9e500e25b33f97f2003c9d7ca20cfd48c868c9bf433a92f3e5afd51c7cf4306c1091ad579eba59c217200215c24c61 |
memory/2388-176-0x0000000006660000-0x00000000066AC000-memory.dmp
memory/2388-177-0x0000000070370000-0x00000000703BC000-memory.dmp
memory/2388-178-0x0000000070B20000-0x0000000070E74000-memory.dmp
memory/2388-188-0x0000000007780000-0x0000000007823000-memory.dmp
memory/2388-189-0x0000000007AA0000-0x0000000007AB1000-memory.dmp
memory/2388-190-0x0000000006300000-0x0000000006314000-memory.dmp
memory/5084-197-0x00000000055F0000-0x0000000005944000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | eed964161bc78962373c86710b86e085 |
| SHA1 | 73a79583dc4ffc95a47389c5e0c71dd39d3f8ca1 |
| SHA256 | 62065f3c3572ac4ca67098cf5f3174f4a217dffffd12dcfe0aa0ba69dcebd535 |
| SHA512 | 4a50e682c7dfde19d59f52bbf53bf03334b81ea023f0a9843f5506305edd886686e2f0b5c7e111a560e9148531e014b4c616c8386e8b518c318bf15537cdb533 |
memory/5084-203-0x0000000070370000-0x00000000703BC000-memory.dmp
memory/5084-204-0x0000000071130000-0x0000000071484000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
| MD5 | d98e33b66343e7c96158444127a117f6 |
| SHA1 | bb716c5509a2bf345c6c1152f6e3e1452d39d50d |
| SHA256 | 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1 |
| SHA512 | 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5 |
memory/1848-220-0x0000000000400000-0x0000000002B0B000-memory.dmp
C:\Windows\windefender.exe
| MD5 | 8e67f58837092385dcf01e8a2b4f5783 |
| SHA1 | 012c49cfd8c5d06795a6f67ea2baf2a082cf8625 |
| SHA256 | 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa |
| SHA512 | 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec |
memory/4392-225-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1080-228-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/4392-227-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1848-229-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1080-230-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1848-231-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1848-233-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1080-234-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1848-235-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1848-237-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1848-239-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1848-241-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1848-243-0x0000000000400000-0x0000000002B0B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-15 18:09
Reported
2024-05-15 18:12
Platform
win11-20240426-en
Max time kernel
8s
Max time network
150s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1520 wrote to memory of 2748 | N/A | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1520 wrote to memory of 2748 | N/A | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1520 wrote to memory of 2748 | N/A | C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe
"C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe
"C:\Users\Admin\AppData\Local\Temp\2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 211f0724-6536-4318-812c-46862500ff70.uuid.statsexplorer.org | udp |
| US | 8.8.8.8:53 | stun.ipfire.org | udp |
| US | 8.8.8.8:53 | server6.statsexplorer.org | udp |
| DE | 81.3.27.44:3478 | stun.ipfire.org | udp |
| US | 162.159.135.233:443 | cdn.discordapp.com | tcp |
| BG | 185.82.216.108:443 | server6.statsexplorer.org | tcp |
| US | 172.67.221.71:443 | carsalessystem.com | tcp |
| BG | 185.82.216.108:443 | server6.statsexplorer.org | tcp |
| US | 52.111.229.48:443 | tcp | |
| BG | 185.82.216.108:443 | server6.statsexplorer.org | tcp |
Files
memory/1520-1-0x00000000048A0000-0x0000000004C9F000-memory.dmp
memory/1520-2-0x0000000004CA0000-0x000000000558B000-memory.dmp
memory/1520-3-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/2748-4-0x00000000003F0000-0x0000000000459000-memory.dmp
memory/2748-5-0x0000000002640000-0x0000000002676000-memory.dmp
memory/2748-6-0x0000000004F00000-0x000000000552A000-memory.dmp
memory/2748-7-0x0000000004C70000-0x0000000004C92000-memory.dmp
memory/2748-9-0x00000000055E0000-0x0000000005646000-memory.dmp
memory/2748-8-0x0000000004E90000-0x0000000004EF6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2t2wfv1d.dfi.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2748-18-0x0000000005710000-0x0000000005A67000-memory.dmp
memory/2748-19-0x0000000005B00000-0x0000000005B1E000-memory.dmp
memory/2748-20-0x0000000005B20000-0x0000000005B6C000-memory.dmp
memory/2748-21-0x00000000060D0000-0x0000000006116000-memory.dmp
memory/2748-24-0x00000000705E0000-0x0000000070937000-memory.dmp
memory/2748-23-0x0000000070460000-0x00000000704AC000-memory.dmp
memory/2748-34-0x0000000006FA0000-0x0000000007044000-memory.dmp
memory/2748-33-0x0000000006F80000-0x0000000006F9E000-memory.dmp
memory/2748-22-0x0000000006F40000-0x0000000006F74000-memory.dmp
memory/2748-36-0x00000000070D0000-0x00000000070EA000-memory.dmp
memory/2748-35-0x0000000007710000-0x0000000007D8A000-memory.dmp
memory/2748-37-0x0000000007110000-0x000000000711A000-memory.dmp
memory/2748-38-0x0000000007220000-0x00000000072B6000-memory.dmp
memory/2748-39-0x0000000007130000-0x0000000007141000-memory.dmp
memory/2748-40-0x0000000007180000-0x000000000718E000-memory.dmp
memory/2748-41-0x0000000007190000-0x00000000071A5000-memory.dmp
memory/2748-42-0x00000000071E0000-0x00000000071FA000-memory.dmp
memory/2748-43-0x0000000007200000-0x0000000007208000-memory.dmp
memory/2748-46-0x00000000003F0000-0x0000000000459000-memory.dmp
memory/1520-49-0x00000000048A0000-0x0000000004C9F000-memory.dmp
memory/1520-48-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1008-50-0x0000000005A50000-0x0000000005DA7000-memory.dmp
memory/1008-59-0x0000000070460000-0x00000000704AC000-memory.dmp
memory/1008-60-0x00000000706B0000-0x0000000070A07000-memory.dmp
memory/1008-69-0x0000000007220000-0x00000000072C4000-memory.dmp
memory/1008-70-0x0000000007530000-0x0000000007541000-memory.dmp
memory/1008-71-0x0000000007580000-0x0000000007595000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | d0c46cad6c0778401e21910bd6b56b70 |
| SHA1 | 7be418951ea96326aca445b8dfe449b2bfa0dca6 |
| SHA256 | 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02 |
| SHA512 | 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949 |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | cd991fc72bd598416c4abf145ccf5ca2 |
| SHA1 | 417c5b069498063cc3eac1461ebb5cbc4c33ba95 |
| SHA256 | 155e10397d41bf2c944bf26328b0336bfbf9f677e97f91d846b68593c60a178f |
| SHA512 | 2ad755db886933ff03f42cdeb957cbcf3d8fe6ce8c0271e946ed0a3f1f098dde1f51a86463faca198891e1c3cc4a475ff3696c364484b11e0eb551a1f5a685e9 |
memory/1520-85-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/2944-86-0x0000000070460000-0x00000000704AC000-memory.dmp
memory/2944-87-0x00000000706B0000-0x0000000070A07000-memory.dmp
memory/2640-84-0x0000000000400000-0x0000000002B0B000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 1f9430e8cb00bd4f203e13f3948e2e2e |
| SHA1 | 0c01b6e81e1bb4873de3a74057efa5f091651945 |
| SHA256 | 5a7a5f27ac607e1b937069de2b1382bbb60adc9c6a33df0d71fb643ed4f957b1 |
| SHA512 | ddd88bee55157714ca67ef853fd7517909c5e8b62693712fc93577d1ee43a6167dc95b7991650f2718e5a326a94cd8da1e1f6df7728c4a214b5b89d73f47eaba |
memory/2216-107-0x00000000706B0000-0x0000000070A07000-memory.dmp
memory/2216-106-0x0000000070460000-0x00000000704AC000-memory.dmp
C:\Windows\rss\csrss.exe
| MD5 | 1969388dbacca767f429ef13ed09463a |
| SHA1 | 5c16463d8dea20fb5f80b4468d27183312162cd4 |
| SHA256 | 29eccada0679b26c6dc9f4477685de1244882bbaccd5bf5cead8535e23e69bb1 |
| SHA512 | 2178af10352f58a4a92e422d7e4b6c74e083efc2f92116bc3dbd391e486dd0634d432c83a46ed358b5109409708f9c9cfb0909453d97a74e477302df93929775 |
C:\Windows\rss\csrss.exe
| MD5 | 1a63d3644b8744cc427c73b4e3ba75ec |
| SHA1 | 6cd5e3d113067faffe6f85d072414a6d368b1ba6 |
| SHA256 | 65c07d7dadd85a8358f2dde059e6e5c0b0159da04bf345fea9f47f4aeb323941 |
| SHA512 | 466e62b67ad5c110c7bc720a56bd9ba0453864d775740b7955f294dd0521b0013612ac75c91b8784817b02be74eea3806275ed99685ba8950cfe007e4e743f60 |
memory/2640-120-0x0000000000400000-0x0000000002B0B000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 4c274d76c73963a8b7e5f8d528d498fc |
| SHA1 | c2d9d6716493b460d80b0c0cb44f27ba2347df72 |
| SHA256 | dc9a8898e69207f97ac710e5ca3f12684d9eaa871619a6ebbabdc2019291f385 |
| SHA512 | 8efccf7cea8276d5cb72799d25e369e4843438899e1340ba72fef5486a1d4d93cd10b5b35b6749d4588186befe608913ce474ad698151b5dd26dd95b2723dd54 |
memory/4696-132-0x0000000005C40000-0x0000000005F97000-memory.dmp
memory/4696-135-0x0000000070600000-0x0000000070957000-memory.dmp
memory/4696-134-0x0000000070460000-0x00000000704AC000-memory.dmp
memory/3404-153-0x00000000063C0000-0x0000000006717000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 315faef7c5e7f1b4de00ebf7d9958f57 |
| SHA1 | 872ba03c3ff25675632be3f1b882bc55c912ad8a |
| SHA256 | 4303a6a8d99984f15524a25b8596e8475e9bd5f013fa428603a2367ca55b013c |
| SHA512 | 115fb3e4018ca2662ff55fd501e1de5c8075aa36f3eaa5aeec8a00fec1406798ad590bd40f0c48219f3287ac8b4eac4eb0a23e7a94c96dd6a0a59da6fa26a989 |
memory/3404-156-0x0000000006D30000-0x0000000006D7C000-memory.dmp
memory/3404-157-0x0000000070380000-0x00000000703CC000-memory.dmp
memory/3404-167-0x0000000007A60000-0x0000000007B04000-memory.dmp
memory/3404-158-0x0000000070500000-0x0000000070857000-memory.dmp
memory/3404-168-0x0000000007DE0000-0x0000000007DF1000-memory.dmp
memory/3404-169-0x00000000062A0000-0x00000000062B5000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | d8051ff84c0f7dacf8a1d861234f935e |
| SHA1 | 35a5e562b3683e4fbd029d6efde818afd36fd0e1 |
| SHA256 | 573edc1a3438c899c96469dddce47eb8d0830043c07f67ad890e49a03c2c5a4d |
| SHA512 | 6d4ae5185e48d5e5d01185809d4a65b3cbfc145c65e7bf4cb552df645e5d0fd5f35579f13b91b78ed19caed844c713616c20d1ac8e7ef1967f287a81a40d7707 |
memory/2792-181-0x0000000070500000-0x0000000070857000-memory.dmp
memory/2792-180-0x0000000070380000-0x00000000703CC000-memory.dmp
memory/1632-190-0x0000000000400000-0x0000000002B0B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
| MD5 | d98e33b66343e7c96158444127a117f6 |
| SHA1 | bb716c5509a2bf345c6c1152f6e3e1452d39d50d |
| SHA256 | 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1 |
| SHA512 | 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5 |
memory/4084-202-0x0000000000400000-0x00000000008DF000-memory.dmp
C:\Windows\windefender.exe
| MD5 | 8e67f58837092385dcf01e8a2b4f5783 |
| SHA1 | 012c49cfd8c5d06795a6f67ea2baf2a082cf8625 |
| SHA256 | 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa |
| SHA512 | 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec |
memory/4084-207-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1344-204-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1632-205-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1344-210-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1632-209-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-212-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1344-216-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1632-215-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-218-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-221-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-224-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-227-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-230-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-233-0x0000000000400000-0x0000000002B0B000-memory.dmp
memory/1632-236-0x0000000000400000-0x0000000002B0B000-memory.dmp