Malware Analysis Report

2025-01-02 06:26

Sample ID 240516-e13rqscb92
Target f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8
SHA256 f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8

Threat Level: Known bad

The file f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Launches sc.exe

Command and Scripting Interpreter: PowerShell

Uses Task Scheduler COM API

Modifies data under HKEY_USERS

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 04:25

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 04:25

Reported

2024-05-16 04:27

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2648 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 3520 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\system32\cmd.exe
PID 4904 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 4280 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1740 wrote to memory of 4280 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4904 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 4904 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 4904 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 2936 wrote to memory of 2676 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 2676 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 2676 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 1288 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 1288 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 1288 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 3228 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 3228 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 3228 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2936 wrote to memory of 1688 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2936 wrote to memory of 1688 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4464 wrote to memory of 1592 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4464 wrote to memory of 1592 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4464 wrote to memory of 1592 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 3892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1592 wrote to memory of 3892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1592 wrote to memory of 3892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 45.19.74.20.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
BE 2.17.107.112:443 www.bing.com tcp
US 8.8.8.8:53 112.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 9d7d48b0-3355-4855-a2ab-0b75deb744cc.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server11.databaseupgrade.ru udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun2.l.google.com udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp

Files

memory/2648-1-0x0000000002990000-0x0000000002D8A000-memory.dmp

memory/2648-2-0x0000000002D90000-0x000000000367B000-memory.dmp

memory/2648-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3520-4-0x0000000074E1E000-0x0000000074E1F000-memory.dmp

memory/3520-5-0x0000000003240000-0x0000000003276000-memory.dmp

memory/3520-6-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/3520-7-0x0000000005BE0000-0x0000000006208000-memory.dmp

memory/3520-8-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/3520-9-0x0000000005A80000-0x0000000005AA2000-memory.dmp

memory/3520-11-0x0000000006210000-0x0000000006276000-memory.dmp

memory/3520-10-0x0000000005B20000-0x0000000005B86000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vxa5at3z.3rh.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3520-17-0x0000000006280000-0x00000000065D4000-memory.dmp

memory/3520-22-0x0000000006850000-0x000000000686E000-memory.dmp

memory/3520-23-0x0000000006880000-0x00000000068CC000-memory.dmp

memory/3520-24-0x0000000006DA0000-0x0000000006DE4000-memory.dmp

memory/3520-25-0x0000000007970000-0x00000000079E6000-memory.dmp

memory/3520-26-0x0000000008070000-0x00000000086EA000-memory.dmp

memory/3520-27-0x0000000007A10000-0x0000000007A2A000-memory.dmp

memory/3520-29-0x0000000070CB0000-0x0000000070CFC000-memory.dmp

memory/3520-28-0x0000000007DC0000-0x0000000007DF2000-memory.dmp

memory/3520-30-0x00000000713F0000-0x0000000071744000-memory.dmp

memory/3520-41-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/3520-40-0x0000000007E00000-0x0000000007E1E000-memory.dmp

memory/3520-42-0x0000000007E20000-0x0000000007EC3000-memory.dmp

memory/3520-43-0x0000000007F10000-0x0000000007F1A000-memory.dmp

memory/3520-44-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/3520-45-0x00000000086F0000-0x0000000008786000-memory.dmp

memory/3520-46-0x0000000007F20000-0x0000000007F31000-memory.dmp

memory/3520-47-0x0000000007F60000-0x0000000007F6E000-memory.dmp

memory/3520-48-0x0000000007F80000-0x0000000007F94000-memory.dmp

memory/3520-49-0x0000000007FC0000-0x0000000007FDA000-memory.dmp

memory/3520-50-0x0000000007FB0000-0x0000000007FB8000-memory.dmp

memory/3520-53-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/4904-55-0x0000000002970000-0x0000000002D6A000-memory.dmp

memory/4904-56-0x0000000002D70000-0x000000000365B000-memory.dmp

memory/4148-66-0x0000000005C60000-0x0000000005FB4000-memory.dmp

memory/4148-67-0x0000000070CB0000-0x0000000070CFC000-memory.dmp

memory/4148-68-0x0000000070E50000-0x00000000711A4000-memory.dmp

memory/4148-78-0x00000000071C0000-0x0000000007263000-memory.dmp

memory/4148-79-0x00000000076D0000-0x00000000076E1000-memory.dmp

memory/2648-80-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2648-82-0x0000000002D90000-0x000000000367B000-memory.dmp

memory/2648-81-0x0000000002990000-0x0000000002D8A000-memory.dmp

memory/4148-83-0x0000000007720000-0x0000000007734000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 3d086a433708053f9bf9523e1d87a4e8
SHA1 b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA256 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

memory/4316-92-0x00000000054B0000-0x0000000005804000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cc03c9ace7e9a28e57c6f68b32c0507d
SHA1 174db2ee45d0e09cda1c10293ee87cbbe50faea5
SHA256 08cdc5968c8f3e91f435c2e10b461796c77f66c5a31c17567706ae0a02dd1d67
SHA512 e59303530c152cd542c7852ee0e10e53695208077d756d86b2cadfaef338a19e51ef2246ce8c0b06c9146ce97844cf1cbdf95ba1fbadcd156a4b5813c69d4446

memory/4316-98-0x0000000070CB0000-0x0000000070CFC000-memory.dmp

memory/4316-99-0x0000000071430000-0x0000000071784000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b5e72627352ad4dd0330a5b40204ebc6
SHA1 229e284ee520a8014b5e3f3110c2aa0facf36b72
SHA256 c5a458340035ec670dafb46c8bb33a14f7d525f1acea91500ca473408c371857
SHA512 14863c24962f03bc0e5a0213260b4123fcadeab9536539d3239ac693c8fdffd21fb2c38c4a620f97ad56628d4f8f4fa4d31ce08f67b7ad4aa44afc55e1090502

memory/1932-120-0x0000000070CB0000-0x0000000070CFC000-memory.dmp

memory/1932-121-0x0000000070E50000-0x00000000711A4000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d7d147cfa65fd2d6347d667ca24ee34a
SHA1 0534a2c89750d3d1ba3620cba6bf0b2bbae69215
SHA256 f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8
SHA512 faecf35812edf851110b9f7f2710437460d8173187342a5437d752ce690798c55b21689bd6d67c7dc1bb26a0d3cb20350e077a11ea57b7f7f6fed2213d7868e4

memory/4904-136-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2676-147-0x0000000005DC0000-0x0000000006114000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f2f5000d2c4377fc3242568b8469b8ae
SHA1 26ee8b61bc8cb99f35d728a9d3d5877bf6d0d08a
SHA256 94c6f2e14ad3926995f9e3375e300f80b29ef923b89135fefb2fc710389ce56a
SHA512 dfbab1d0317ad196d67c3cdc90a8ee8e988e29e4f5da02b9b78302f7643ec6c0957e62c147cae59fbbc96cf2364268b70eecff5c58e8e7b01fd32249a2d5b329

memory/2676-149-0x0000000070CB0000-0x0000000070CFC000-memory.dmp

memory/2676-150-0x0000000070E30000-0x0000000071184000-memory.dmp

memory/1288-170-0x0000000005E80000-0x00000000061D4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c9129abe468088adc89aecc25f8d1f3e
SHA1 37c227785d9191575d59e48ebb014e5c49983e4c
SHA256 0a96759b1cd68cdb4d414d2bd8964393a568f97f838ea400f6084cdc7b99af67
SHA512 13d57d58012973225a53fadb0aae4c2ed97a301871d537ae785abfa89aa95cdf0e04df1fdc788ec7b394375b48c52ff1540fc5475e599c9df46dd1fe9a047052

memory/1288-172-0x00000000069A0000-0x00000000069EC000-memory.dmp

memory/1288-174-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

memory/1288-175-0x0000000070D50000-0x00000000710A4000-memory.dmp

memory/1288-185-0x0000000007660000-0x0000000007703000-memory.dmp

memory/1288-186-0x0000000007970000-0x0000000007981000-memory.dmp

memory/1288-187-0x0000000006220000-0x0000000006234000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0b169ba92cd5f1791540901eb203d8a9
SHA1 f644958306a43b659d9daf1c5ade022cbda23632
SHA256 2664ef35e3b3c8ab68eb7051abb46deb8c3c415c53bbcd742711931f40072f49
SHA512 c5a1070866d209f4b96252cdf383adea0b69977c44b28eecf76f9870704665fe9e0f87cf5ac114934184f0fdd098ea4a53fadf5fb6d4178dcb18aa0ec57f281d

memory/3228-199-0x0000000070BD0000-0x0000000070C1C000-memory.dmp

memory/3228-200-0x0000000070D50000-0x00000000710A4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2936-216-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4464-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4400-224-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4464-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2936-226-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4400-228-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2936-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4400-234-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2936-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-244-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-250-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-253-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-256-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2936-259-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 04:25

Reported

2024-05-16 04:27

Platform

win11-20240419-en

Max time kernel

37s

Max time network

132s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2488 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2488 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2488 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 2828 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\system32\cmd.exe
PID 5012 wrote to memory of 2828 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\system32\cmd.exe
PID 2828 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2828 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 5012 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5012 wrote to memory of 3096 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 5012 wrote to memory of 3096 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 5012 wrote to memory of 3096 N/A C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe C:\Windows\rss\csrss.exe
PID 3096 wrote to memory of 976 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 976 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 976 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 3380 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 3380 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 3380 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 1832 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 1832 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 1832 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3096 wrote to memory of 4812 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3096 wrote to memory of 4812 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe

"C:\Users\Admin\AppData\Local\Temp\f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 38a03462-34b7-45c7-bcc6-4cf655b30be8.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 server15.databaseupgrade.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.108:443 server15.databaseupgrade.ru tcp
US 104.21.94.82:443 carsalessystem.com tcp

Files

memory/2488-1-0x0000000002A50000-0x0000000002E50000-memory.dmp

memory/2488-2-0x0000000002E50000-0x000000000373B000-memory.dmp

memory/2488-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3212-4-0x00000000746DE000-0x00000000746DF000-memory.dmp

memory/3212-5-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

memory/3212-7-0x00000000746D0000-0x0000000074E81000-memory.dmp

memory/3212-6-0x00000000055E0000-0x0000000005C0A000-memory.dmp

memory/3212-8-0x00000000746D0000-0x0000000074E81000-memory.dmp

memory/3212-9-0x00000000054E0000-0x0000000005502000-memory.dmp

memory/3212-11-0x0000000005D60000-0x0000000005DC6000-memory.dmp

memory/3212-10-0x0000000005C80000-0x0000000005CE6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fa5nlp0o.yst.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3212-17-0x0000000005DD0000-0x0000000006127000-memory.dmp

memory/3212-21-0x0000000006280000-0x000000000629E000-memory.dmp

memory/3212-22-0x00000000062B0000-0x00000000062FC000-memory.dmp

memory/3212-23-0x00000000067E0000-0x0000000006826000-memory.dmp

memory/3212-24-0x00000000076A0000-0x00000000076D4000-memory.dmp

memory/3212-26-0x0000000070AD0000-0x0000000070E27000-memory.dmp

memory/3212-25-0x0000000070940000-0x000000007098C000-memory.dmp

memory/3212-37-0x00000000746D0000-0x0000000074E81000-memory.dmp

memory/3212-36-0x0000000007700000-0x00000000077A4000-memory.dmp

memory/3212-35-0x00000000076E0000-0x00000000076FE000-memory.dmp

memory/3212-38-0x00000000746D0000-0x0000000074E81000-memory.dmp

memory/3212-39-0x0000000007E70000-0x00000000084EA000-memory.dmp

memory/3212-40-0x0000000007830000-0x000000000784A000-memory.dmp

memory/3212-41-0x00000000050D0000-0x00000000050DA000-memory.dmp

memory/3212-42-0x00000000079A0000-0x0000000007A36000-memory.dmp

memory/3212-43-0x00000000078B0000-0x00000000078C1000-memory.dmp

memory/3212-44-0x0000000007900000-0x000000000790E000-memory.dmp

memory/3212-45-0x0000000007910000-0x0000000007925000-memory.dmp

memory/3212-46-0x0000000007960000-0x000000000797A000-memory.dmp

memory/3212-47-0x0000000007950000-0x0000000007958000-memory.dmp

memory/3212-50-0x00000000746D0000-0x0000000074E81000-memory.dmp

memory/5012-52-0x0000000002A50000-0x0000000002E54000-memory.dmp

memory/4044-61-0x00000000063E0000-0x0000000006737000-memory.dmp

memory/4044-62-0x0000000070940000-0x000000007098C000-memory.dmp

memory/4044-63-0x0000000070AC0000-0x0000000070E17000-memory.dmp

memory/4044-72-0x0000000007B30000-0x0000000007BD4000-memory.dmp

memory/4044-73-0x0000000007E50000-0x0000000007E61000-memory.dmp

memory/2488-74-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2488-75-0x0000000002A50000-0x0000000002E50000-memory.dmp

memory/2488-76-0x0000000002E50000-0x000000000373B000-memory.dmp

memory/4044-77-0x0000000007EA0000-0x0000000007EB5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e0f73bcb0bf0a808a1c52fe62e4d1c08
SHA1 5443ff1da2829cf9bf270a1e423649ef0f507a53
SHA256 f40d5a53f29e1d300e334f05bb18e6279aa1cb8dbb53f9f11e9991c9ac179a4e
SHA512 a95b22bacfd0ee8ee2d81c492258a0e00bbb0b5ae6cd8206d5100f195ba344b7d3c04f2bc1e725e18e9bb0692db42936b980bdbb2bffa7cb8ab8761b475e886b

memory/4844-90-0x0000000070940000-0x000000007098C000-memory.dmp

memory/4844-91-0x0000000070AC0000-0x0000000070E17000-memory.dmp

memory/3008-106-0x00000000056F0000-0x0000000005A47000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d0355e150e7c41ee9e8fe023102cd3ac
SHA1 856e69a43816a09c65fbe9f62128207bd5249248
SHA256 88975977633905ee886472e31978c58e3d5ebde3bfb6c6f4ab2308fc569ea5d1
SHA512 ba78a77fa23939493064e4d48dc6868325d52ba3db684d036e521887256aff5aed7ff0a175acb9b79530e3ff481e4f7666d8916b32157f3fbee7897ae6de28d6

memory/3008-112-0x0000000070B50000-0x0000000070EA7000-memory.dmp

memory/3008-111-0x0000000070940000-0x000000007098C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d7d147cfa65fd2d6347d667ca24ee34a
SHA1 0534a2c89750d3d1ba3620cba6bf0b2bbae69215
SHA256 f3e6369b79f26a63c22b033973a2964715862a2b3706d4bd063f6d93534c23a8
SHA512 faecf35812edf851110b9f7f2710437460d8173187342a5437d752ce690798c55b21689bd6d67c7dc1bb26a0d3cb20350e077a11ea57b7f7f6fed2213d7868e4

memory/5012-125-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/976-134-0x00000000054D0000-0x0000000005827000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 fab58d54d947b656e3a03706b23e788d
SHA1 73bdc4d2ce84dd22436be5f6b2bb0d9a15454d35
SHA256 437d3f04320ca1f84ca037f49d592bf9ec74d191be136a2a1cef88a273d5ff56
SHA512 cc9fa3cdd6021e79654312312dc80e29e7248738c99a83d6fee114777a4d86ed1d11b026266f0b1d5ebdb82d95084b1b28ee8bdc5e4fb53a786bd29ba3f5377e

memory/976-139-0x0000000070940000-0x000000007098C000-memory.dmp

memory/976-140-0x0000000070B90000-0x0000000070EE7000-memory.dmp

memory/3380-158-0x0000000005670000-0x00000000059C7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 66c31d8737c49628aa28b8cb33c571c2
SHA1 b05fa7ad0e5a5d2dc2911f56effab42c04ab4909
SHA256 c5f368ff5c409180a1e6a51bec96814a08b1e3d9b759443e49b23809c910c3f2
SHA512 4bb4bbfa295fa31fb60a3890cfdfe1e77708f0235491c8395fe11f250f5d29cbdd4a9211171e965899b7504b1d96b790984e2ddfb6a388257d27a007e8ec6806

memory/3380-160-0x0000000005D90000-0x0000000005DDC000-memory.dmp

memory/3380-161-0x0000000070860000-0x00000000708AC000-memory.dmp

memory/3380-162-0x0000000070AB0000-0x0000000070E07000-memory.dmp

memory/3380-171-0x0000000006E50000-0x0000000006EF4000-memory.dmp

memory/3380-172-0x00000000071B0000-0x00000000071C1000-memory.dmp

memory/3380-173-0x00000000059F0000-0x0000000005A05000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 74323f6809df9a54db624a1b8e5c9f07
SHA1 1f144e5da1dd599986b3fbc7c7135d28c4bf51f1
SHA256 0e0aea2f71008d411d0b738511cd43303598459c0a70a91288db968e8b78ffc1
SHA512 6bef8b0d689eadbc3fc98b4011df67eca723549be324f5bfd7b53e519a5d2650d7a5b91040bd67de6736cca0f67a3dda9155d6077d55011dd670dbcef678d44e

memory/1832-184-0x0000000070860000-0x00000000708AC000-memory.dmp

memory/1832-185-0x0000000070AB0000-0x0000000070E07000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3096-201-0x0000000000400000-0x0000000000D1C000-memory.dmp