Malware Analysis Report

2025-01-02 06:38

Sample ID 240515-x3htfsgb43
Target 45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c
SHA256 45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c

Threat Level: Known bad

The file 45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Command and Scripting Interpreter: PowerShell

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 19:22

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 19:22

Reported

2024-05-15 19:25

Platform

win11-20240508-en

Max time kernel

149s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 412 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 412 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 412 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\system32\cmd.exe
PID 4500 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\system32\cmd.exe
PID 4156 wrote to memory of 1048 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4156 wrote to memory of 1048 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4500 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4500 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 4500 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 4500 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 3188 wrote to memory of 1696 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 1696 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 1696 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2276 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2276 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 2276 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3188 wrote to memory of 3368 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3188 wrote to memory of 3368 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3116 wrote to memory of 3892 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3116 wrote to memory of 3892 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3116 wrote to memory of 3892 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3892 wrote to memory of 1840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3892 wrote to memory of 1840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3892 wrote to memory of 1840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 93e5e178-5d5e-43fb-b569-c8fbe5d456f7.uuid.realupdate.ru udp
US 8.8.8.8:53 stun4.l.google.com udp
US 8.8.8.8:53 server11.realupdate.ru udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun4.l.google.com udp
BG 185.82.216.96:443 server11.realupdate.ru tcp
US 104.21.94.82:443 carsalessystem.com tcp
US 52.111.227.14:443 tcp
BG 185.82.216.96:443 server11.realupdate.ru tcp
BG 185.82.216.96:443 server11.realupdate.ru tcp

Files

memory/412-1-0x00000000048A0000-0x0000000004CA7000-memory.dmp

memory/412-2-0x0000000004CB0000-0x000000000559B000-memory.dmp

memory/412-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4372-4-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

memory/4372-5-0x00000000031C0000-0x00000000031F6000-memory.dmp

memory/4372-6-0x0000000074AD0000-0x0000000075281000-memory.dmp

memory/4372-7-0x0000000074AD0000-0x0000000075281000-memory.dmp

memory/4372-8-0x0000000005B40000-0x000000000616A000-memory.dmp

memory/4372-9-0x00000000058C0000-0x00000000058E2000-memory.dmp

memory/4372-10-0x0000000005A80000-0x0000000005AE6000-memory.dmp

memory/4372-11-0x0000000006170000-0x00000000061D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kaczljqw.3ts.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4372-20-0x00000000061E0000-0x0000000006537000-memory.dmp

memory/4372-21-0x0000000006670000-0x000000000668E000-memory.dmp

memory/4372-22-0x0000000006720000-0x000000000676C000-memory.dmp

memory/4372-23-0x0000000006BE0000-0x0000000006C26000-memory.dmp

memory/4372-26-0x0000000070D40000-0x0000000070D8C000-memory.dmp

memory/4372-27-0x0000000070EC0000-0x0000000071217000-memory.dmp

memory/4372-36-0x0000000007AE0000-0x0000000007AFE000-memory.dmp

memory/4372-25-0x0000000007880000-0x00000000078B4000-memory.dmp

memory/4372-37-0x0000000007B00000-0x0000000007BA4000-memory.dmp

memory/4372-38-0x0000000074AD0000-0x0000000075281000-memory.dmp

memory/412-24-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4372-39-0x0000000074AD0000-0x0000000075281000-memory.dmp

memory/4372-41-0x0000000007C20000-0x0000000007C3A000-memory.dmp

memory/4372-40-0x0000000008270000-0x00000000088EA000-memory.dmp

memory/4372-42-0x0000000007C60000-0x0000000007C6A000-memory.dmp

memory/4372-43-0x0000000007D70000-0x0000000007E06000-memory.dmp

memory/4372-44-0x0000000007C80000-0x0000000007C91000-memory.dmp

memory/4372-45-0x0000000007CD0000-0x0000000007CDE000-memory.dmp

memory/4372-46-0x0000000007CE0000-0x0000000007CF5000-memory.dmp

memory/4372-47-0x0000000007D30000-0x0000000007D4A000-memory.dmp

memory/4372-48-0x0000000007D20000-0x0000000007D28000-memory.dmp

memory/4372-51-0x0000000074AD0000-0x0000000075281000-memory.dmp

memory/412-53-0x00000000048A0000-0x0000000004CA7000-memory.dmp

memory/412-55-0x0000000004CB0000-0x000000000559B000-memory.dmp

memory/412-54-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/412-56-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3580-65-0x0000000005C30000-0x0000000005F87000-memory.dmp

memory/4500-66-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3580-67-0x0000000070D40000-0x0000000070D8C000-memory.dmp

memory/3580-68-0x0000000070EE0000-0x0000000071237000-memory.dmp

memory/3580-77-0x0000000007320000-0x00000000073C4000-memory.dmp

memory/3580-78-0x0000000007650000-0x0000000007661000-memory.dmp

memory/3580-79-0x00000000076C0000-0x00000000076D5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/4944-92-0x0000000005980000-0x0000000005CD7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 14a50b5601b491a916d17a1f78bd808b
SHA1 649d75eac252778cd9b2dabc9fc20e00acd96eaf
SHA256 07c04325c68a24b0b37fffb467e432c21f296fe17e1cbb09a423b6a9af9c93d4
SHA512 102c5ac5fef9e98aeb9652c3b775d61a601308af9f9057ca1ed78da08b77ab2f837c5d90d7ea0994ae363e1ac5b30ea9b0b1216fec88c06e7b224832fd394db3

memory/4944-95-0x0000000070F50000-0x00000000712A7000-memory.dmp

memory/4944-94-0x0000000070D40000-0x0000000070D8C000-memory.dmp

memory/1424-105-0x00000000060F0000-0x0000000006447000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 4546bfaf8d0b41fe8c039e3189e45b89
SHA1 352f707a9eef460c137bdcfca498c731339342ce
SHA256 944f45c8f83b24618c28191a1fea3aa7a0b1c832222a138d78e065eaaea726a1
SHA512 b248f597beeab925155bcb254f45c3ebeb70faae425a3b8cc1b105bd91690c9faf8eb55bef2eae38f72ba64d479472a9e52e0b0acf5bb8ec98987321125b144f

memory/1424-116-0x0000000070F90000-0x00000000712E7000-memory.dmp

memory/1424-115-0x0000000070D40000-0x0000000070D8C000-memory.dmp

memory/4500-125-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 e285774ca0642cd61c42dfffd04ed622
SHA1 87a9760f8f962ba675a5fe77ec70d3d1409619e1
SHA256 45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c
SHA512 0f0a5f76ab39aebf688b3cd9b9c7e2abc5b4a1db64f906b0a9295b3d9410a18574b1da628a4695d4c74c2a37a70c740bc818a8e4b2de474d271233edfbab5132

memory/4500-131-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6aef1ca3297456d7446273c7c4615d54
SHA1 c9f1ac1951bc574c6c3d115e877177edee024f42
SHA256 05764bbff43e838e6446fea94f0e2f64d3e52b33396df0f3b9ed57234ba6e777
SHA512 efe1482cd3731a22b548bb43ed85b508f1babcee7c54b59c744b412b858ecce81ab76267eee353d92a3ae14900f716a48a5c3cd12bc6907579c303d97ef38beb

memory/1696-144-0x0000000070D40000-0x0000000070D8C000-memory.dmp

memory/1696-145-0x0000000070EC0000-0x0000000071217000-memory.dmp

memory/2164-155-0x0000000006120000-0x0000000006477000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b8f8a28f29e651ae1073ce1450d7a450
SHA1 61e59e45bf19e35ab1bd54ba45374e3fbded1e73
SHA256 1a1d38179ee7d2183530d452e23f33a17c65de3f3d4e19f64bf22f661a7c4a76
SHA512 e05d2ee19308258cac6161c398a44c4a00f4289bae64b06ec3f6d87dc0e5867a9b8ce01472a5fd2f4d3eead996f924503a48a50d6b746dce19159af9e4e0d14d

memory/2164-165-0x00000000066B0000-0x00000000066FC000-memory.dmp

memory/2164-167-0x0000000070EB0000-0x0000000071207000-memory.dmp

memory/2164-166-0x0000000070C60000-0x0000000070CAC000-memory.dmp

memory/2164-176-0x0000000007910000-0x00000000079B4000-memory.dmp

memory/2164-177-0x0000000007C70000-0x0000000007C81000-memory.dmp

memory/2164-178-0x00000000064A0000-0x00000000064B5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0af729fa813acf5ec3575f39325f0040
SHA1 690af4aa991290eae55af0bbeff431e615dad54a
SHA256 eb0afcf69c5bb0a04b426d8017796d6d1bfc10f3f8efecb35f867b0ac27131f3
SHA512 055b59e29800b63991beb668312660c02ed41873d57e9be86aa6cc6c06170c85b55d13fcff0043294b314b595a9e416518ab0a2953b021b891a2649ac58b1dbb

memory/2276-189-0x0000000070C60000-0x0000000070CAC000-memory.dmp

memory/2276-190-0x0000000070EB0000-0x0000000071207000-memory.dmp

memory/3188-200-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3188-208-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3116-212-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4576-215-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3116-217-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3188-219-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4576-220-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3188-222-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3188-225-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/4576-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3188-228-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3188-231-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3188-234-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3188-237-0x0000000000400000-0x0000000002B0B000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 19:22

Reported

2024-05-15 19:25

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\system32\cmd.exe
PID 3312 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 436 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2196 wrote to memory of 436 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3312 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3312 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 3312 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 3312 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe C:\Windows\rss\csrss.exe
PID 2252 wrote to memory of 2616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 2616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 2616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 1620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 1620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 1620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 2908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 2908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 2908 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2252 wrote to memory of 3132 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2252 wrote to memory of 3132 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2468 wrote to memory of 3156 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2468 wrote to memory of 3156 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2468 wrote to memory of 3156 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3156 wrote to memory of 2680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3156 wrote to memory of 2680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3156 wrote to memory of 2680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:8

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe

"C:\Users\Admin\AppData\Local\Temp\45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
BE 2.17.196.176:443 www.bing.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 176.196.17.2.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 32.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 fd2c6cfa-8a82-441f-8c5c-e610cf498885.uuid.realupdate.ru udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 stun1.l.google.com udp
US 8.8.8.8:53 server4.realupdate.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun1.l.google.com udp
BG 185.82.216.96:443 server4.realupdate.ru tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
BG 185.82.216.96:443 server4.realupdate.ru tcp
US 8.8.8.8:53 133.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 105.193.132.51.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
BG 185.82.216.96:443 server4.realupdate.ru tcp

Files

memory/3068-1-0x00000000047D0000-0x0000000004BD6000-memory.dmp

memory/3068-2-0x0000000004BE0000-0x00000000054CB000-memory.dmp

memory/3068-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4776-4-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

memory/4776-5-0x0000000002CD0000-0x0000000002D06000-memory.dmp

memory/4776-6-0x0000000005590000-0x0000000005BB8000-memory.dmp

memory/4776-7-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4776-8-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4776-9-0x00000000054F0000-0x0000000005512000-memory.dmp

memory/4776-11-0x0000000005CA0000-0x0000000005D06000-memory.dmp

memory/4776-10-0x0000000005C30000-0x0000000005C96000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_c5xv3xfr.53p.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4776-21-0x0000000005E10000-0x0000000006164000-memory.dmp

memory/4776-23-0x00000000062D0000-0x000000000631C000-memory.dmp

memory/4776-22-0x00000000062B0000-0x00000000062CE000-memory.dmp

memory/4776-24-0x0000000006850000-0x0000000006894000-memory.dmp

memory/4776-25-0x00000000075D0000-0x0000000007646000-memory.dmp

memory/4776-26-0x0000000007CD0000-0x000000000834A000-memory.dmp

memory/4776-27-0x0000000007670000-0x000000000768A000-memory.dmp

memory/4776-29-0x0000000070A60000-0x0000000070AAC000-memory.dmp

memory/4776-31-0x0000000070BE0000-0x0000000070F34000-memory.dmp

memory/4776-30-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4776-41-0x0000000007870000-0x000000000788E000-memory.dmp

memory/4776-42-0x0000000007890000-0x0000000007933000-memory.dmp

memory/4776-28-0x0000000007830000-0x0000000007862000-memory.dmp

memory/4776-43-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4776-44-0x0000000007980000-0x000000000798A000-memory.dmp

memory/4776-45-0x0000000007A40000-0x0000000007AD6000-memory.dmp

memory/4776-46-0x00000000079A0000-0x00000000079B1000-memory.dmp

memory/4776-47-0x00000000079E0000-0x00000000079EE000-memory.dmp

memory/4776-48-0x00000000079F0000-0x0000000007A04000-memory.dmp

memory/4776-49-0x0000000007AE0000-0x0000000007AFA000-memory.dmp

memory/4776-50-0x0000000007A30000-0x0000000007A38000-memory.dmp

memory/4776-53-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/3068-56-0x00000000047D0000-0x0000000004BD6000-memory.dmp

memory/3068-57-0x0000000004BE0000-0x00000000054CB000-memory.dmp

memory/3068-55-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3068-58-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2004-68-0x0000000006360000-0x00000000066B4000-memory.dmp

memory/3312-70-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2004-72-0x00000000711E0000-0x0000000071534000-memory.dmp

memory/2004-71-0x0000000070A60000-0x0000000070AAC000-memory.dmp

memory/2004-82-0x0000000007B80000-0x0000000007C23000-memory.dmp

memory/2004-83-0x0000000007E60000-0x0000000007E71000-memory.dmp

memory/2004-84-0x0000000007EB0000-0x0000000007EC4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 afd9d94a300148ed9117ca1dab6d4496
SHA1 aff0b756719eef00044c79addc65eb75ca6ab5bb
SHA256 2ffb57ed9830159ac555b06ea42288f9bcda9f260562886f1917c1120448c7cb
SHA512 a618057a63bb03802f7c3205af9b30a2cc09288400bd477b1f44b14e45f355b6431279530a4d859fd776b2051d4635002e22ebe8470eac3af0897f3551400e15

memory/4544-98-0x0000000070A60000-0x0000000070AAC000-memory.dmp

memory/4544-99-0x00000000711E0000-0x0000000071534000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 120de31a8998dc5f40366cdec0023b1a
SHA1 95591ee8a4e03ca7ce3cb3eb5d6f8264e796e85b
SHA256 077ab4b04ba61c7c92efe3d8f05e9544b81a4bdca335a52102409ffa036fe0cf
SHA512 e716ffcc847c78a0c9a12dee03b46927cb023ce0c939edd4c707555a16f0ab45f6f9eb3ed7b63f6e885cfe646a9a96c7b5e417d48ad29ec453ad7590a2bb6077

memory/1500-120-0x0000000070A60000-0x0000000070AAC000-memory.dmp

memory/1500-121-0x0000000070BE0000-0x0000000070F34000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 e285774ca0642cd61c42dfffd04ed622
SHA1 87a9760f8f962ba675a5fe77ec70d3d1409619e1
SHA256 45fc5537e7dd996052373650e8fd956df3426fbb253d31d56d2597a3eb44ac9c
SHA512 0f0a5f76ab39aebf688b3cd9b9c7e2abc5b4a1db64f906b0a9295b3d9410a18574b1da628a4695d4c74c2a37a70c740bc818a8e4b2de474d271233edfbab5132

memory/3312-135-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-140-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2616-150-0x00000000062E0000-0x0000000006634000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 92a58381b9450727d3711f571df6b172
SHA1 003847d88dbe0957a8492248d96ca06adc8c0072
SHA256 1b6bc9a42653e5a81065903ffb8ed31031c34457cc247233ebeb82ade1c05932
SHA512 60fa72eb00ff707d81ec4512aa683e862c86d065783790b2861d1686541481b742f93a5a2072f326e2063362791a66f3b07345e1f93195942c91dd89c8e5c273

memory/2616-152-0x0000000070A60000-0x0000000070AAC000-memory.dmp

memory/2616-153-0x0000000070C00000-0x0000000070F54000-memory.dmp

memory/1620-173-0x00000000057E0000-0x0000000005B34000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 320e0d59368398129f27aa10da234fae
SHA1 00c25c7baaf053d9673b301e4a7ec3e1faf6cf45
SHA256 b20ab7f2b367dc4208f9ecef24da83a5be71c54f3f27402ca152050ca226ed40
SHA512 5307f52043ab6500caf3b29d069485307155f5502d85e29d4d9b587222b35235b84467d0d11e11617bc91ab2c886f468023f8d850965816bb9bd87d4999c9e30

memory/1620-175-0x0000000005CA0000-0x0000000005CEC000-memory.dmp

memory/1620-176-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/1620-177-0x0000000070B00000-0x0000000070E54000-memory.dmp

memory/1620-187-0x0000000006F00000-0x0000000006FA3000-memory.dmp

memory/1620-188-0x0000000007100000-0x0000000007111000-memory.dmp

memory/1620-189-0x0000000005730000-0x0000000005744000-memory.dmp

memory/2908-191-0x0000000006260000-0x00000000065B4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6046bcb7ed30b0f83e65dec798cd4f47
SHA1 9ed17088496640ac089b1028fda5c3beaa41db33
SHA256 0fc55ce758d6994a2a3e8432afdce94dd9a8082877364ef96651827647cee46b
SHA512 c848a0b688a3c6ef60fbe74f0495444b05c56811ee16ae2fd723623c2c8d9b800e3a8e1d969e34edf670512580bbf5e676e1485b953e71ba417db10a585ddfd1

memory/2908-202-0x0000000070980000-0x00000000709CC000-memory.dmp

memory/2908-203-0x0000000071110000-0x0000000071464000-memory.dmp

memory/2252-214-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2252-222-0x0000000000400000-0x0000000002B0B000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2468-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2468-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3804-230-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2252-233-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3804-234-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2252-236-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-238-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/3804-240-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2252-241-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-244-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-248-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-250-0x0000000000400000-0x0000000002B0B000-memory.dmp

memory/2252-253-0x0000000000400000-0x0000000002B0B000-memory.dmp