Malware Analysis Report

2025-01-02 06:28

Sample ID 240516-e23s5acc35
Target b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df
SHA256 b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df

Threat Level: Known bad

The file b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Adds Run key to start application

Checks installed software on the system

Manipulates WinMonFS driver.

Drops file in System32 directory

Drops file in Windows directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Command and Scripting Interpreter: PowerShell

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Creates scheduled task(s)

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 04:27

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 04:27

Reported

2024-05-16 04:29

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 400 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 400 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 400 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\system32\cmd.exe
PID 1268 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\system32\cmd.exe
PID 5072 wrote to memory of 4184 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 5072 wrote to memory of 4184 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1268 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1268 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 1268 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 1268 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 3344 wrote to memory of 1216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 1856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3344 wrote to memory of 388 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3344 wrote to memory of 388 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 5064 wrote to memory of 3632 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5064 wrote to memory of 3632 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 5064 wrote to memory of 3632 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3632 wrote to memory of 3256 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3632 wrote to memory of 3256 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3632 wrote to memory of 3256 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
BE 88.221.83.201:443 www.bing.com tcp
US 8.8.8.8:53 201.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 56c234b0-192b-40ff-b7fd-4dc50aef1d64.uuid.statscreate.org udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 stun.sipgate.net udp
US 8.8.8.8:53 server14.statscreate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 3.33.249.248:3478 stun.sipgate.net udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.96:443 server14.statscreate.org tcp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 248.249.33.3.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.96:443 server14.statscreate.org tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
BG 185.82.216.96:443 server14.statscreate.org tcp

Files

memory/400-1-0x0000000002920000-0x0000000002D1B000-memory.dmp

memory/400-2-0x0000000002D20000-0x000000000360B000-memory.dmp

memory/400-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2716-4-0x0000000074CEE000-0x0000000074CEF000-memory.dmp

memory/2716-5-0x0000000002F90000-0x0000000002FC6000-memory.dmp

memory/2716-7-0x0000000005B00000-0x0000000006128000-memory.dmp

memory/2716-6-0x0000000074CE0000-0x0000000075490000-memory.dmp

memory/2716-8-0x0000000074CE0000-0x0000000075490000-memory.dmp

memory/2716-9-0x00000000058F0000-0x0000000005912000-memory.dmp

memory/2716-10-0x00000000061E0000-0x0000000006246000-memory.dmp

memory/2716-11-0x0000000006250000-0x00000000062B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tnahmxvu.sz4.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2716-21-0x00000000062C0000-0x0000000006614000-memory.dmp

memory/2716-22-0x00000000068C0000-0x00000000068DE000-memory.dmp

memory/2716-23-0x00000000068F0000-0x000000000693C000-memory.dmp

memory/2716-24-0x0000000006E60000-0x0000000006EA4000-memory.dmp

memory/2716-25-0x00000000079D0000-0x0000000007A46000-memory.dmp

memory/2716-26-0x0000000008300000-0x000000000897A000-memory.dmp

memory/2716-27-0x0000000007C80000-0x0000000007C9A000-memory.dmp

memory/2716-30-0x0000000071300000-0x0000000071654000-memory.dmp

memory/2716-29-0x0000000070B80000-0x0000000070BCC000-memory.dmp

memory/2716-41-0x0000000007E70000-0x0000000007E8E000-memory.dmp

memory/2716-42-0x0000000074CE0000-0x0000000075490000-memory.dmp

memory/2716-31-0x0000000074CE0000-0x0000000075490000-memory.dmp

memory/2716-28-0x0000000007E30000-0x0000000007E62000-memory.dmp

memory/2716-43-0x0000000007E90000-0x0000000007F33000-memory.dmp

memory/2716-44-0x0000000007F80000-0x0000000007F8A000-memory.dmp

memory/2716-45-0x0000000008090000-0x0000000008126000-memory.dmp

memory/2716-46-0x0000000007F90000-0x0000000007FA1000-memory.dmp

memory/2716-47-0x0000000007FD0000-0x0000000007FDE000-memory.dmp

memory/2716-48-0x0000000007FF0000-0x0000000008004000-memory.dmp

memory/2716-49-0x0000000008030000-0x000000000804A000-memory.dmp

memory/2716-50-0x0000000008020000-0x0000000008028000-memory.dmp

memory/2716-53-0x0000000074CE0000-0x0000000075490000-memory.dmp

memory/1268-55-0x0000000002960000-0x0000000002D62000-memory.dmp

memory/4436-65-0x0000000070B80000-0x0000000070BCC000-memory.dmp

memory/4436-66-0x0000000071300000-0x0000000071654000-memory.dmp

memory/4436-76-0x0000000006F90000-0x0000000007033000-memory.dmp

memory/4436-77-0x00000000072C0000-0x00000000072D1000-memory.dmp

memory/4436-78-0x0000000007310000-0x0000000007324000-memory.dmp

memory/400-82-0x0000000002920000-0x0000000002D1B000-memory.dmp

memory/400-81-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3180-93-0x0000000006380000-0x00000000066D4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 471482c7a3a71f5637ff96db604b60ae
SHA1 6a6f70f8e44203b002a7b8e2822d90abb7a70c03
SHA256 bb97e628929e0cf7e8eea183fefe312cffa711136c2275ab78032eeec3bc1249
SHA512 15d46dd53eee8887c0c66e5e3294371c73c452a3720a9442d6aa5747e21706d77087654a6f9b0e1b42ac0e9723eaab6fc4fd944ee97b0a63918b38dde1c03423

memory/3180-95-0x0000000070B80000-0x0000000070BCC000-memory.dmp

memory/3180-96-0x0000000071330000-0x0000000071684000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c5b1478ca757ca81b7ae87744e9dbd6b
SHA1 f300de14ddb3732d173dfb59b8c3d19a7a42dbb4
SHA256 bd2226bf6e629a9990c10c74d869d7d72114e3b0090215cac5041bfa02bc7e20
SHA512 1cb23c6c8c5e2e334c7f7be26875f9452372f3bbb8d49595e6e2837caaceec9daa42f36a99931f2b027b5ec5a4c840bb8001f478d66d566d25dbe0b4b42883ca

memory/2424-118-0x0000000071300000-0x0000000071654000-memory.dmp

memory/2424-117-0x0000000070B80000-0x0000000070BCC000-memory.dmp

memory/400-128-0x0000000002D20000-0x000000000360B000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 ecdfb00cfd850adbe3a723e2bcb3084e
SHA1 28186151e349b1a86a227235aac4db1444ee780c
SHA256 b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df
SHA512 a9d1bf214aae81ac090f65d81b4c0c9a815cceb9fd9a48d8e4853dcd83ba6585fa6488636734363ff37417ec5d548322312e37bec9f739374f8b81c8d0d6a835

memory/1268-133-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1216-145-0x0000000005C70000-0x0000000005FC4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 91d01167e7c8674b09edc24ddb8703d6
SHA1 153d05218c47fcac37d6554edaaf01b927a4ba78
SHA256 ff412b799a8995264b2caba0ba5c69ab2e2520c3d76d43fad5b39b6fb559d70f
SHA512 bcb2e79333cfa7a94e30f899d876a868ca33084efb917a198d7efa97520998f3fc97752b1c8b3dbfac8d65f06ea6584fa27f618a6f042bee1f4f47330f61949c

memory/1216-147-0x0000000070B80000-0x0000000070BCC000-memory.dmp

memory/1216-148-0x0000000070D00000-0x0000000071054000-memory.dmp

memory/1836-168-0x0000000005870000-0x0000000005BC4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 200859803dc00ba6b75db0974c495e9d
SHA1 ad67795bbde1ce46ba5d1c57429249174f178f20
SHA256 380b71c4459b89630b09f19d07b929d70a24132672dd33b8a592352c25d3f207
SHA512 7e4f102705d8ada7858c0f1a0799dea55afc0d644d75d42fa9fd68b60a42fd2c0d98ec546aaedada945a2926da86a7572fc7a4a0dfce8cf8b94a0f29f8265f64

memory/1836-170-0x0000000006050000-0x000000000609C000-memory.dmp

memory/1836-171-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

memory/1836-172-0x0000000070C20000-0x0000000070F74000-memory.dmp

memory/1836-182-0x0000000007060000-0x0000000007103000-memory.dmp

memory/1836-183-0x00000000073C0000-0x00000000073D1000-memory.dmp

memory/1836-184-0x0000000005BF0000-0x0000000005C04000-memory.dmp

memory/1856-196-0x00000000060F0000-0x0000000006444000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b85515e05edb99c073a29c55f24afcb4
SHA1 399f6e28f1cbc89a567b0d3d02a5b63cc510a7b7
SHA256 29a831a5d8a6bba64f64378055071120955a554ac4cf813f982188e00e1780ab
SHA512 9000c8cd482ba9de4eda75b4afab918ffadd2747ca59fc962a5bf5730a7b241386d9b5507d43852f26b966b1f04b73abe76d5cf0535e8a66b8fe304ed95ef353

memory/1856-199-0x0000000071230000-0x0000000071584000-memory.dmp

memory/1856-198-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3344-215-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/5064-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5064-224-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3344-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4344-228-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3344-227-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4344-233-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3344-234-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-239-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-242-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-246-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-251-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-254-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3344-258-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 04:27

Reported

2024-05-16 04:29

Platform

win11-20240508-en

Max time kernel

149s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1032 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1032 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1032 wrote to memory of 1072 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\system32\cmd.exe
PID 2780 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\system32\cmd.exe
PID 4452 wrote to memory of 4648 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4452 wrote to memory of 4648 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2780 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2780 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 2780 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 2780 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe C:\Windows\rss\csrss.exe
PID 2448 wrote to memory of 3316 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 3316 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 3316 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4796 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4796 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4796 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 4216 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2448 wrote to memory of 1996 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2448 wrote to memory of 1996 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4752 wrote to memory of 688 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4752 wrote to memory of 688 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4752 wrote to memory of 688 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 688 wrote to memory of 3752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 3752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 688 wrote to memory of 3752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe

"C:\Users\Admin\AppData\Local\Temp\b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.96:443 server2.statscreate.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
BG 185.82.216.96:443 server2.statscreate.org tcp
BG 185.82.216.96:443 server2.statscreate.org tcp
BG 185.82.216.96:443 server2.statscreate.org tcp

Files

memory/1032-1-0x0000000002B00000-0x0000000002F04000-memory.dmp

memory/1032-2-0x0000000002F10000-0x00000000037FB000-memory.dmp

memory/1032-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1072-4-0x00000000749DE000-0x00000000749DF000-memory.dmp

memory/1072-5-0x0000000004BD0000-0x0000000004C06000-memory.dmp

memory/1072-7-0x00000000052B0000-0x00000000058DA000-memory.dmp

memory/1072-6-0x00000000749D0000-0x0000000075181000-memory.dmp

memory/1072-8-0x00000000749D0000-0x0000000075181000-memory.dmp

memory/1072-9-0x0000000005930000-0x0000000005952000-memory.dmp

memory/1072-10-0x00000000059D0000-0x0000000005A36000-memory.dmp

memory/1072-11-0x0000000005A40000-0x0000000005AA6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fqeq30cs.jn5.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1072-20-0x0000000005CA0000-0x0000000005FF7000-memory.dmp

memory/1072-21-0x0000000006080000-0x000000000609E000-memory.dmp

memory/1072-22-0x00000000060C0000-0x000000000610C000-memory.dmp

memory/1072-23-0x0000000006600000-0x0000000006646000-memory.dmp

memory/1072-26-0x00000000749D0000-0x0000000075181000-memory.dmp

memory/1072-25-0x0000000070C40000-0x0000000070C8C000-memory.dmp

memory/1072-37-0x0000000007520000-0x00000000075C4000-memory.dmp

memory/1072-36-0x0000000007500000-0x000000000751E000-memory.dmp

memory/1072-27-0x0000000070DC0000-0x0000000071117000-memory.dmp

memory/1072-24-0x00000000074C0000-0x00000000074F4000-memory.dmp

memory/1072-39-0x0000000007650000-0x000000000766A000-memory.dmp

memory/1072-38-0x0000000007C90000-0x000000000830A000-memory.dmp

memory/1072-40-0x00000000749D0000-0x0000000075181000-memory.dmp

memory/1072-41-0x0000000007690000-0x000000000769A000-memory.dmp

memory/1072-42-0x00000000077A0000-0x0000000007836000-memory.dmp

memory/1072-43-0x00000000076B0000-0x00000000076C1000-memory.dmp

memory/1072-44-0x0000000007700000-0x000000000770E000-memory.dmp

memory/1072-45-0x0000000007710000-0x0000000007725000-memory.dmp

memory/1072-46-0x0000000007760000-0x000000000777A000-memory.dmp

memory/1072-47-0x0000000007780000-0x0000000007788000-memory.dmp

memory/1072-50-0x00000000749D0000-0x0000000075181000-memory.dmp

memory/2780-52-0x0000000002A50000-0x0000000002E53000-memory.dmp

memory/2480-53-0x0000000005720000-0x0000000005A77000-memory.dmp

memory/2480-63-0x0000000070E90000-0x00000000711E7000-memory.dmp

memory/2480-62-0x0000000070C40000-0x0000000070C8C000-memory.dmp

memory/2480-72-0x0000000006E10000-0x0000000006EB4000-memory.dmp

memory/2480-73-0x0000000007130000-0x0000000007141000-memory.dmp

memory/2480-74-0x0000000007180000-0x0000000007195000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/3468-83-0x0000000006170000-0x00000000064C7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 502365b2e612dc8005f16ff80ed7c4a1
SHA1 7a5da0995a624c7c3e07c3b979a543fee505aa85
SHA256 a2da0ed49316971494556696b5f37994921b2a3963c10f9f07df72dba99ed10d
SHA512 b8b15aa0a7a857849b1f9b415bec295faa0c543aa8e58f9e54c1690f51786e070b052367ca32bdf5c390c59cf38fc62de072eb9ef9db10797710c166751b6182

memory/3468-89-0x0000000070E50000-0x00000000711A7000-memory.dmp

memory/3468-88-0x0000000070C40000-0x0000000070C8C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 246760b186c927a445f1c987b6b91509
SHA1 4005349bc1cfb959177baba881b3992860a35c31
SHA256 bee8fef128e6d99a608345cba24e101c66913820e0c23127ad73aa5f8828302f
SHA512 da871f06f39c4cbbaa32cbe04c7b2613dec4f55d234aa319e69142139d4cf8513e06e98456282c01a204306f58de64083687eff0788312fd18e4b0667f7261a3

memory/2288-109-0x0000000070E90000-0x00000000711E7000-memory.dmp

memory/2288-108-0x0000000070C40000-0x0000000070C8C000-memory.dmp

memory/1032-119-0x0000000002B00000-0x0000000002F04000-memory.dmp

memory/1032-118-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1032-120-0x0000000002F10000-0x00000000037FB000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 ecdfb00cfd850adbe3a723e2bcb3084e
SHA1 28186151e349b1a86a227235aac4db1444ee780c
SHA256 b8b02f338922b4997d3173239212d26679bc231c765b870f8aab6305460d75df
SHA512 a9d1bf214aae81ac090f65d81b4c0c9a815cceb9fd9a48d8e4853dcd83ba6585fa6488636734363ff37417ec5d548322312e37bec9f739374f8b81c8d0d6a835

memory/2780-126-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 052cf9b38ef93a1665ab454dcd7df09c
SHA1 77ba5b7e913d0dbbfaa084e188306f395ae3ed8a
SHA256 3e2b81a2e88db3755d29d89cca9ba953c01e4ab44b988b949bbe315122c9bd59
SHA512 7cfffb839a5c650e035e740db6157253cfc9dfa2378723af8a13c8c549fec235bed0ac5f1c93d1a63d81361c1e019efc3aa8104eda5eeb49d1f7a8f5ec393b02

memory/3316-137-0x0000000070C40000-0x0000000070C8C000-memory.dmp

memory/3316-138-0x0000000070E50000-0x00000000711A7000-memory.dmp

memory/4796-156-0x0000000005880000-0x0000000005BD7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 81ed1f1d53e883223ab098056fc4ccac
SHA1 64989f9d125c4e61731aa01a2d32f32b088fce04
SHA256 de83b0de2cb79b9f16662a4b910069d4e9fdc5b17a30861b7b2e78d1adcbfe59
SHA512 c86d9a46204a4d9fb891873b260e2addf0e207f9c9b289931331c028d69dfd59d30e8bd2cef0f49e62e661073f8477b3ecca6d5cf98fd6d4fb874d5069a02602

memory/4796-158-0x0000000006050000-0x000000000609C000-memory.dmp

memory/4796-159-0x0000000070B60000-0x0000000070BAC000-memory.dmp

memory/4796-160-0x0000000070CE0000-0x0000000071037000-memory.dmp

memory/4796-169-0x0000000007090000-0x0000000007134000-memory.dmp

memory/4796-170-0x0000000007430000-0x0000000007441000-memory.dmp

memory/4796-171-0x0000000005C20000-0x0000000005C35000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 44f04f093f793762d6146ab574912a36
SHA1 a937e143eed3b20ff317476e8cb901814fed7eec
SHA256 a4343314f6859facf3cfa89b415c01e7111929aea8bd1d66a3674bda84de03ca
SHA512 e318f9b68068d43419c754c577caafab2f7cc09dbe48d5496750bd244375e418112c808e9b362a7466600b8d5e0230a701b67a0945483c1e824801cebd6fafe6

memory/4216-183-0x0000000070B60000-0x0000000070BAC000-memory.dmp

memory/4216-184-0x0000000070CE0000-0x0000000071037000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2448-199-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4752-205-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1468-207-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4752-209-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2448-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1468-213-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2448-212-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-215-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1468-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2448-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-227-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-234-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-239-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2448-242-0x0000000000400000-0x0000000000D1C000-memory.dmp