Malware Analysis Report

2025-01-02 06:27

Sample ID 240516-e189hscb96
Target 05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062
SHA256 05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062

Threat Level: Known bad

The file 05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Adds Run key to start application

Manipulates WinMonFS driver.

Checks installed software on the system

Drops file in System32 directory

Launches sc.exe

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Command and Scripting Interpreter: PowerShell

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 04:25

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 04:25

Reported

2024-05-16 04:28

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3940 wrote to memory of 3844 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3940 wrote to memory of 3844 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3940 wrote to memory of 3844 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\system32\cmd.exe
PID 1708 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\system32\cmd.exe
PID 232 wrote to memory of 3344 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 232 wrote to memory of 3344 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1708 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1708 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 1708 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 1708 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 1956 wrote to memory of 2968 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 2968 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 2968 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 4724 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 4724 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 4724 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 3336 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 3336 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 3336 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1956 wrote to memory of 1560 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1956 wrote to memory of 1560 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3616 wrote to memory of 4480 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3616 wrote to memory of 4480 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3616 wrote to memory of 4480 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4480 wrote to memory of 2416 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4480 wrote to memory of 2416 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4480 wrote to memory of 2416 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4456,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
BE 88.221.83.192:443 www.bing.com tcp
US 8.8.8.8:53 192.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 d41d57b9-0b8e-4ffb-be55-47059e2d2d3d.uuid.statscreate.org udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 server4.statscreate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.96:443 server4.statscreate.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.96:443 server4.statscreate.org tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
BG 185.82.216.96:443 server4.statscreate.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
BG 185.82.216.96:443 server4.statscreate.org tcp

Files

memory/3940-1-0x0000000002930000-0x0000000002D2B000-memory.dmp

memory/3940-2-0x0000000002D30000-0x000000000361B000-memory.dmp

memory/3940-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3844-4-0x00000000748CE000-0x00000000748CF000-memory.dmp

memory/3844-5-0x0000000005000000-0x0000000005036000-memory.dmp

memory/3844-6-0x00000000056C0000-0x0000000005CE8000-memory.dmp

memory/3844-7-0x00000000748C0000-0x0000000075070000-memory.dmp

memory/3844-8-0x00000000748C0000-0x0000000075070000-memory.dmp

memory/3844-14-0x0000000005D60000-0x0000000005D82000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ls1gdvvq.pml.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3844-19-0x0000000006000000-0x0000000006066000-memory.dmp

memory/3844-20-0x00000000060E0000-0x0000000006146000-memory.dmp

memory/3844-21-0x0000000006150000-0x00000000064A4000-memory.dmp

memory/3844-22-0x00000000065E0000-0x00000000065FE000-memory.dmp

memory/3844-23-0x0000000006820000-0x000000000686C000-memory.dmp

memory/3844-24-0x0000000006B50000-0x0000000006B94000-memory.dmp

memory/3844-25-0x00000000078F0000-0x0000000007966000-memory.dmp

memory/3844-27-0x0000000007990000-0x00000000079AA000-memory.dmp

memory/3844-26-0x0000000007FF0000-0x000000000866A000-memory.dmp

memory/3844-29-0x0000000070760000-0x00000000707AC000-memory.dmp

memory/3844-30-0x00000000708E0000-0x0000000070C34000-memory.dmp

memory/3844-31-0x00000000748C0000-0x0000000075070000-memory.dmp

memory/3844-28-0x0000000007B50000-0x0000000007B82000-memory.dmp

memory/3844-41-0x0000000007B90000-0x0000000007BAE000-memory.dmp

memory/3844-42-0x0000000007BB0000-0x0000000007C53000-memory.dmp

memory/3844-43-0x00000000748C0000-0x0000000075070000-memory.dmp

memory/3844-44-0x0000000007CA0000-0x0000000007CAA000-memory.dmp

memory/3844-45-0x0000000007DB0000-0x0000000007E46000-memory.dmp

memory/3844-46-0x0000000007CB0000-0x0000000007CC1000-memory.dmp

memory/3844-47-0x0000000007CF0000-0x0000000007CFE000-memory.dmp

memory/3844-48-0x0000000007D10000-0x0000000007D24000-memory.dmp

memory/3844-49-0x0000000007D50000-0x0000000007D6A000-memory.dmp

memory/3844-50-0x0000000007D40000-0x0000000007D48000-memory.dmp

memory/3844-53-0x00000000748C0000-0x0000000075070000-memory.dmp

memory/3940-54-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3940-55-0x0000000002D30000-0x000000000361B000-memory.dmp

memory/1708-57-0x00000000029E0000-0x0000000002DDD000-memory.dmp

memory/3268-58-0x0000000006120000-0x0000000006474000-memory.dmp

memory/3268-68-0x00000000067D0000-0x000000000681C000-memory.dmp

memory/3268-69-0x0000000070860000-0x00000000708AC000-memory.dmp

memory/3268-70-0x0000000071020000-0x0000000071374000-memory.dmp

memory/3268-80-0x0000000007990000-0x0000000007A33000-memory.dmp

memory/3268-81-0x0000000007C90000-0x0000000007CA1000-memory.dmp

memory/3268-82-0x0000000007CE0000-0x0000000007CF4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3456-95-0x00000000057F0000-0x0000000005B44000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0892b63f7d73ccf2b687c2ef6ee56e4b
SHA1 b569a82ed33968f0342872ead5b3d82fab016ef7
SHA256 434240fbf936c1c393dfd406bbd6a23c04d01683d3778c477120fa9100a277da
SHA512 fc706943772359a47d8aea404e0e5c6ca6ebb2c6799b219f00d26b2f89d983e81c888b65af5ec776b4ef658c20c6b155bb4f800d05a3de35645d409302261904

memory/3456-97-0x0000000070860000-0x00000000708AC000-memory.dmp

memory/3456-98-0x00000000709E0000-0x0000000070D34000-memory.dmp

memory/1788-109-0x00000000061C0000-0x0000000006514000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3d451114d7001056522e38956dd4f62d
SHA1 4f5d8daa9d7e1388df47350b50f61ee63902046f
SHA256 7300f6b7a467681f33fc35b7f76437581d327cd71dacaff52760f71841e1e071
SHA512 288d530843eb22977a635fec2bd6f4bf6683bb4e6031414ad88ae1513bd3b1f7bf5e7651dab03e678d090fe3007fafc3a0fecb1860c501ae59581b491bf3e703

memory/1788-120-0x0000000070860000-0x00000000708AC000-memory.dmp

memory/1788-121-0x0000000071000000-0x0000000071354000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 9b5c65a422aecaefb9b91b91f784b6be
SHA1 16c39d97134485b143564bd1c768b1f6698acdbb
SHA256 05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062
SHA512 495f9ef1746ce09fb3037500c06f3ddc39f9ab8ac11c7ad1f9f76eff84a00e22b4dc6c04893751562535ec853d157445affb345a4f08024971f62cee61dd8985

memory/1708-135-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2968-143-0x0000000005900000-0x0000000005C54000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 12cd40641c2ae5fe2066905d4772eee3
SHA1 dcee2081e3173428a56c1e39148b4c41d22a1590
SHA256 0c1313700bf007fa05a95f6833730da6e94440ee1a95a7b85662873a868808c1
SHA512 504ea26fc643b56e5cc028c37015ee1972bf65872293fd7eb7bea0a3afd35d39d567de8946d36bf48b9c52d31ad619fbfc8bfaea9829fc75a83152cff6faae44

memory/2968-149-0x0000000006500000-0x000000000654C000-memory.dmp

memory/2968-151-0x0000000070F60000-0x00000000712B4000-memory.dmp

memory/2968-150-0x00000000707C0000-0x000000007080C000-memory.dmp

memory/2968-161-0x0000000007210000-0x00000000072B3000-memory.dmp

memory/2968-162-0x0000000007510000-0x0000000007521000-memory.dmp

memory/2968-163-0x0000000005CB0000-0x0000000005CC4000-memory.dmp

memory/4724-174-0x0000000005FA0000-0x00000000062F4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ec744231b79e1bfb2e3616a9f34a923b
SHA1 6d3d4bd8908663af85d6aa6dda833382dd1d276b
SHA256 34e76830e7a806455799d089246116283362c4f7cebd925c63191c1ce0c4ea84
SHA512 948b31da41a4f4ac9f55a91073d86b3a054a0e041a1285302324af17fc05822e8193ec1ad8dd398ad1b8f4981f359c4adef4af133049c06b536265dd9462ee6d

memory/4724-176-0x00000000065C0000-0x000000000660C000-memory.dmp

memory/4724-178-0x0000000070860000-0x0000000070BB4000-memory.dmp

memory/4724-177-0x00000000706E0000-0x000000007072C000-memory.dmp

memory/4724-188-0x00000000077A0000-0x0000000007843000-memory.dmp

memory/4724-189-0x0000000005D50000-0x0000000005D61000-memory.dmp

memory/4724-190-0x0000000006330000-0x0000000006344000-memory.dmp

memory/3336-192-0x0000000005A90000-0x0000000005DE4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e8b67ebc06a4db9657939ea3303ff5f1
SHA1 fd5b23437463e133ece848630a0dae55f31de761
SHA256 b51eb95024e9c004c41efa9cdcec2ec27a593a5fb884d4d693f6cc6e1e88dd31
SHA512 9126ce057793804520d8d117b874685181e16d5bb6c90dd8f6210ff35184968d2a4ab9da0d03e1756ca1f787e0a8c06226f4d8f5f5a932176fd2654c5979daee

memory/3336-204-0x0000000070E70000-0x00000000711C4000-memory.dmp

memory/3336-203-0x00000000706E0000-0x000000007072C000-memory.dmp

memory/1956-214-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3616-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1956-224-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2568-228-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3616-230-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2568-232-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1956-231-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2568-236-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1956-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-239-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-243-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1956-251-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 04:25

Reported

2024-05-16 04:28

Platform

win11-20240426-en

Max time kernel

149s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4596 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4596 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4596 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 1432 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 1432 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 1432 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 4824 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\windefender.exe
PID 4848 wrote to memory of 4824 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\windefender.exe
PID 4824 wrote to memory of 3000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4824 wrote to memory of 3000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4848 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4848 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 4848 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 4848 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe C:\Windows\rss\csrss.exe
PID 2640 wrote to memory of 2520 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2520 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2520 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2700 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 1112 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 1112 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 1112 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2544 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2640 wrote to memory of 2544 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2508 wrote to memory of 1908 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2508 wrote to memory of 1908 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2508 wrote to memory of 1908 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 2144 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1908 wrote to memory of 2144 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1908 wrote to memory of 2144 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe

"C:\Users\Admin\AppData\Local\Temp\05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 7d99e2d7-8149-475b-8899-c9e20d122ed5.uuid.statscreate.org udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 3.33.249.248:3478 stun.sipgate.net udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.96:443 server15.statscreate.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.96:443 server15.statscreate.org tcp
BG 185.82.216.96:443 server15.statscreate.org tcp
N/A 127.0.0.1:31465 tcp

Files

memory/4596-1-0x0000000002A30000-0x0000000002E33000-memory.dmp

memory/4596-2-0x0000000002E40000-0x000000000372B000-memory.dmp

memory/4596-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2504-4-0x000000007420E000-0x000000007420F000-memory.dmp

memory/2504-5-0x0000000003160000-0x0000000003196000-memory.dmp

memory/2504-7-0x0000000074200000-0x00000000749B1000-memory.dmp

memory/2504-6-0x00000000059C0000-0x0000000005FEA000-memory.dmp

memory/2504-9-0x0000000005940000-0x00000000059A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_103wg4sc.34o.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2504-20-0x00000000061C0000-0x0000000006517000-memory.dmp

memory/2504-19-0x0000000074200000-0x00000000749B1000-memory.dmp

memory/2504-10-0x0000000006120000-0x0000000006186000-memory.dmp

memory/2504-8-0x00000000058A0000-0x00000000058C2000-memory.dmp

memory/2504-21-0x0000000006640000-0x000000000665E000-memory.dmp

memory/2504-22-0x0000000006C50000-0x0000000006C9C000-memory.dmp

memory/2504-23-0x0000000006B50000-0x0000000006B96000-memory.dmp

memory/2504-37-0x0000000074200000-0x00000000749B1000-memory.dmp

memory/2504-36-0x0000000007AD0000-0x0000000007B74000-memory.dmp

memory/2504-38-0x0000000074200000-0x00000000749B1000-memory.dmp

memory/2504-40-0x0000000007BF0000-0x0000000007C0A000-memory.dmp

memory/2504-39-0x0000000008230000-0x00000000088AA000-memory.dmp

memory/2504-41-0x0000000007C30000-0x0000000007C3A000-memory.dmp

memory/2504-35-0x0000000007AB0000-0x0000000007ACE000-memory.dmp

memory/2504-26-0x00000000705F0000-0x0000000070947000-memory.dmp

memory/2504-42-0x0000000007D40000-0x0000000007DD6000-memory.dmp

memory/2504-25-0x0000000070470000-0x00000000704BC000-memory.dmp

memory/2504-43-0x0000000007C50000-0x0000000007C61000-memory.dmp

memory/2504-24-0x0000000007A50000-0x0000000007A84000-memory.dmp

memory/2504-44-0x0000000007CA0000-0x0000000007CAE000-memory.dmp

memory/2504-45-0x0000000007CB0000-0x0000000007CC5000-memory.dmp

memory/2504-46-0x0000000007D00000-0x0000000007D1A000-memory.dmp

memory/2504-47-0x0000000007D20000-0x0000000007D28000-memory.dmp

memory/2504-50-0x0000000074200000-0x00000000749B1000-memory.dmp

memory/4848-52-0x0000000002AB0000-0x0000000002EAA000-memory.dmp

memory/1432-61-0x00000000056C0000-0x0000000005A17000-memory.dmp

memory/1432-62-0x0000000070470000-0x00000000704BC000-memory.dmp

memory/1432-72-0x0000000006E30000-0x0000000006ED4000-memory.dmp

memory/1432-63-0x0000000070610000-0x0000000070967000-memory.dmp

memory/1432-73-0x0000000007140000-0x0000000007151000-memory.dmp

memory/1432-74-0x0000000007190000-0x00000000071A5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/4304-86-0x0000000005E60000-0x00000000061B7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 df93e42e27be24a3e5d40111d295852f
SHA1 20825c82b481d61fa99e7105f3b0d5d01d7947a8
SHA256 847a524af94d3a360e556a91e4a3ecfb554af67e764b4095bd54fcf5446c2180
SHA512 95759f89aa3502ea59e8e6798fcc8d28617d0d3f1cd065d4433acec4fc97e3198adf1a5ac1997f6b6050b25a189e5881f038b9b6e36b8044e09ac39d2b47cd33

memory/4304-89-0x00000000706A0000-0x00000000709F7000-memory.dmp

memory/4304-88-0x0000000070470000-0x00000000704BC000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b2864583496707d84d9f9515557aabd6
SHA1 921d90f677edbfa01e41cf37fa85e638dd25f5d3
SHA256 3774131c7f8db650c8e8fe3742a0f9530ca1dc5d06d2fada36f79b49dc20e0d7
SHA512 db11cd5b562570ed8ad7894d03ae44ec320a7e03bc1bcbc70c5822ec2faf1b4def4c214b05aec742e89b9622a14513f1bc1a84b8b71583e40dfd4e44ad854e18

memory/896-109-0x00000000706A0000-0x00000000709F7000-memory.dmp

memory/896-108-0x0000000070470000-0x00000000704BC000-memory.dmp

memory/4596-120-0x0000000002E40000-0x000000000372B000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 9b5c65a422aecaefb9b91b91f784b6be
SHA1 16c39d97134485b143564bd1c768b1f6698acdbb
SHA256 05e3fc3b5bfc90cc123e56eca24f71ecaaa0831371fc8345b46e9091a7c0b062
SHA512 495f9ef1746ce09fb3037500c06f3ddc39f9ab8ac11c7ad1f9f76eff84a00e22b4dc6c04893751562535ec853d157445affb345a4f08024971f62cee61dd8985

memory/4596-118-0x0000000002A30000-0x0000000002E33000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 de827d5748159754a4792b302d65c21f
SHA1 599a23b9ccbd2e8ec37d40640dfcd9b349cb0fa4
SHA256 b3e5ac88a39ade7d070b51a2ab79ee6509f17e7cf65dfc471a0bdff059e41e4e
SHA512 4ac3ed4e46120e29b7e48b9830e2caa56342329d89b4f21915b6569cea45771fb86d117cb426acafaada89cdfafe4cdc512d761330d6d70756f2e15c59ac76e9

memory/2520-136-0x0000000070610000-0x0000000070967000-memory.dmp

memory/2520-135-0x0000000070470000-0x00000000704BC000-memory.dmp

memory/4596-146-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2700-147-0x0000000005BC0000-0x0000000005F17000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 903f322d286f95418437990d0ebef794
SHA1 3fe3ebcc5638a9f383cea4073738fa85e9cdff17
SHA256 5f7424d21281a94f51bb0d4b4bf413875f1a3afcaafe8dfce3aa8ba6f3fd4e12
SHA512 dab5b970a650d3cd2436ef79ab88d19c8eea3e911d6e777ef593fda0e1ebb03985a1654b8c6091d545215e1ca404bc4947bb8985189b691a4b1e9bfe1a52d2e8

memory/2700-157-0x0000000006350000-0x000000000639C000-memory.dmp

memory/2700-159-0x00000000705E0000-0x0000000070937000-memory.dmp

memory/2700-168-0x0000000007380000-0x0000000007424000-memory.dmp

memory/2700-158-0x0000000070390000-0x00000000703DC000-memory.dmp

memory/2700-169-0x00000000076D0000-0x00000000076E1000-memory.dmp

memory/2700-170-0x0000000005F40000-0x0000000005F55000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a331c6cbbebf507dd47438da6930c60b
SHA1 606754c5c0cc75e940f9b95ee15be1e3a040594f
SHA256 6d6fb86480467a0facaf99f5fec370f3859d585088d9974b96fba5c8571c1e46
SHA512 7c4084328dacaa17199acea9f6879581b634994313efe808e91d89ceaff218aa5724e3039137adae1514b5d5100c10c4f8fc2298590d7184feeacc34a32307a4

memory/1112-180-0x0000000005D40000-0x0000000006097000-memory.dmp

memory/1112-183-0x00000000705C0000-0x0000000070917000-memory.dmp

memory/1112-182-0x0000000070390000-0x00000000703DC000-memory.dmp

memory/4848-192-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2640-200-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2508-205-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4824-208-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2508-210-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4848-211-0x0000000002AB0000-0x0000000002EAA000-memory.dmp

memory/2640-213-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4824-215-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2640-217-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4824-223-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2640-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-253-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2640-257-0x0000000000400000-0x0000000000D1C000-memory.dmp