Malware Analysis Report

2025-01-02 06:27

Sample ID 240516-e2ljvabh6v
Target 73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b
SHA256 73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b

Threat Level: Known bad

The file 73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Blocklisted process makes network request

Modifies Windows Firewall

UPX packed file

Executes dropped EXE

Manipulates WinMonFS driver.

Adds Run key to start application

Checks installed software on the system

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Command and Scripting Interpreter: PowerShell

Program crash

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 04:26

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 04:26

Reported

2024-05-16 04:28

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4044 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4044 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4044 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\system32\cmd.exe
PID 4488 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\system32\cmd.exe
PID 1196 wrote to memory of 1968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1196 wrote to memory of 1968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4488 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4488 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 4488 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 4488 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 4804 wrote to memory of 4924 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 4924 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 4924 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 1400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 1400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 1400 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 3004 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 3004 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 3004 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4804 wrote to memory of 4272 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4804 wrote to memory of 4272 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 688 wrote to memory of 4656 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 688 wrote to memory of 4656 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 688 wrote to memory of 4656 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4656 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4656 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4656 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 88.221.83.234:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 234.83.221.88.in-addr.arpa udp
BE 88.221.83.234:443 www.bing.com tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 2ad2f7ac-b86f-4336-8a67-fe4866de542f.uuid.myfastupdate.org udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server16.myfastupdate.org udp
US 162.159.129.233:443 cdn.discordapp.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.111:443 server16.myfastupdate.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 111.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
BG 185.82.216.111:443 server16.myfastupdate.org tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
BG 185.82.216.111:443 server16.myfastupdate.org tcp
N/A 127.0.0.1:31465 tcp

Files

memory/4044-1-0x00000000029B0000-0x0000000002DAE000-memory.dmp

memory/4044-2-0x0000000002DB0000-0x000000000369B000-memory.dmp

memory/4044-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3916-4-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

memory/3916-5-0x0000000002220000-0x0000000002256000-memory.dmp

memory/3916-7-0x0000000074EE0000-0x0000000075690000-memory.dmp

memory/3916-6-0x0000000004E40000-0x0000000005468000-memory.dmp

memory/3916-8-0x0000000074EE0000-0x0000000075690000-memory.dmp

memory/3916-9-0x0000000004C80000-0x0000000004CA2000-memory.dmp

memory/3916-11-0x0000000005550000-0x00000000055B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_grqf1a0m.gqj.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3916-10-0x0000000005470000-0x00000000054D6000-memory.dmp

memory/3916-21-0x00000000055C0000-0x0000000005914000-memory.dmp

memory/3916-22-0x0000000005B30000-0x0000000005B4E000-memory.dmp

memory/3916-23-0x0000000005BE0000-0x0000000005C2C000-memory.dmp

memory/3916-24-0x00000000060B0000-0x00000000060F4000-memory.dmp

memory/3916-25-0x0000000006E60000-0x0000000006ED6000-memory.dmp

memory/3916-27-0x0000000006F00000-0x0000000006F1A000-memory.dmp

memory/3916-26-0x0000000007560000-0x0000000007BDA000-memory.dmp

memory/3916-29-0x0000000074EE0000-0x0000000075690000-memory.dmp

memory/3916-28-0x00000000070C0000-0x00000000070F2000-memory.dmp

memory/3916-30-0x0000000070D80000-0x0000000070DCC000-memory.dmp

memory/3916-31-0x0000000070F00000-0x0000000071254000-memory.dmp

memory/3916-41-0x0000000007100000-0x000000000711E000-memory.dmp

memory/3916-42-0x0000000007120000-0x00000000071C3000-memory.dmp

memory/3916-43-0x0000000007210000-0x000000000721A000-memory.dmp

memory/3916-44-0x0000000074EE0000-0x0000000075690000-memory.dmp

memory/3916-45-0x0000000007320000-0x00000000073B6000-memory.dmp

memory/3916-46-0x0000000007220000-0x0000000007231000-memory.dmp

memory/3916-48-0x0000000007280000-0x0000000007294000-memory.dmp

memory/3916-49-0x00000000072C0000-0x00000000072DA000-memory.dmp

memory/3916-47-0x0000000007260000-0x000000000726E000-memory.dmp

memory/3916-50-0x00000000072B0000-0x00000000072B8000-memory.dmp

memory/3916-53-0x0000000074EE0000-0x0000000075690000-memory.dmp

memory/4044-56-0x00000000029B0000-0x0000000002DAE000-memory.dmp

memory/4488-55-0x00000000029D0000-0x0000000002DCC000-memory.dmp

memory/1536-66-0x00000000054B0000-0x0000000005804000-memory.dmp

memory/1536-68-0x0000000070F20000-0x0000000071274000-memory.dmp

memory/1536-78-0x0000000006CC0000-0x0000000006D63000-memory.dmp

memory/1536-67-0x0000000070D80000-0x0000000070DCC000-memory.dmp

memory/1536-79-0x0000000006F80000-0x0000000006F91000-memory.dmp

memory/1536-80-0x0000000006FD0000-0x0000000006FE4000-memory.dmp

memory/4044-83-0x0000000002DB0000-0x000000000369B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/2352-91-0x0000000005700000-0x0000000005A54000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 2b6a013c258d23584cd27dcbbbb2369e
SHA1 f62e73cc95841775c334f2e74db9e6abb6741807
SHA256 68469d607a43556194d7affb409c3d0fbdde1c0f264a59c61fd9333716b8ffa1
SHA512 53a3336a1c9e9fadb9b11f1b453f2b82012c855a0cf78e74127018c052d7d82c8c14f729f28ad8492c0f3385d4afca14449314a70589dc32cca7217481ac7259

memory/2352-97-0x0000000071B30000-0x0000000071E84000-memory.dmp

memory/2352-96-0x0000000070D80000-0x0000000070DCC000-memory.dmp

memory/4536-111-0x0000000006340000-0x0000000006694000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 71068a220a79c5003dccb08d6fcf365f
SHA1 fcd0491e28945bfa8b3e7ee87417b2aea3b14355
SHA256 c9ceb566f760ad735bf562d343f9ebc7a54eeb33c32fe25edeca896b7091378f
SHA512 897fa5b3859d33d831d0d97124ac751d60ac7bea2edb02202f6b21b06b5eac946588e82a0f1950b4ace41628953ff56a5d86e74e287c6024da150ff47302b55a

memory/4536-120-0x0000000071500000-0x0000000071854000-memory.dmp

memory/4536-119-0x0000000070D80000-0x0000000070DCC000-memory.dmp

memory/4044-131-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d142e671eded49f4bf539b2b1218b313
SHA1 78661927b47b3a4eb0c091eb325a69b2727c1360
SHA256 73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b
SHA512 5a7ad1249fa322ce05a6528f927f424e33d649d0e2cf5f0127eacd6cf02aa420f76ff848469674678cbf1ed220d2155cea580e24acd7c0d31587856f10a21a7e

memory/4924-146-0x0000000005EB0000-0x0000000006204000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ebec5361bc1f01a815b3cc5959464702
SHA1 db84ee3fc60b97c6f7a7e29f9fdf9e215cfa0a7f
SHA256 4b8c938026bfb6fdadbca60a5715f9ef651fea5bcd65df6a295e050a5b9877a9
SHA512 944a0548d802a83c88d815056d1f1e0b1cc89eb8fabc24a07461593b163604e123e43d2314828960312538f0bf4e746338dbf45b2ae698a17e857c69bc3e2148

memory/4924-149-0x0000000071170000-0x00000000714C4000-memory.dmp

memory/4924-148-0x0000000070D80000-0x0000000070DCC000-memory.dmp

memory/1400-169-0x0000000005CA0000-0x0000000005FF4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c5ed89cb871c040adba133285d701a44
SHA1 8f5547f40f5e340b05628fb9a56c7eff94406886
SHA256 d5d598a885b471a5d23a4398ad76d01b0062d247397137ccec6bb1098b8906a4
SHA512 563b9d7d9b1f492c63840d776aac7d4d10ddb8d0e82939a30fa138a53ef0098ace6cd72f909cc69752994206ce6e440986c2ac0e46febe90e0a84e989c04f5ce

memory/1400-171-0x00000000068B0000-0x00000000068FC000-memory.dmp

memory/1400-173-0x0000000071450000-0x00000000717A4000-memory.dmp

memory/1400-172-0x0000000070CA0000-0x0000000070CEC000-memory.dmp

memory/1400-183-0x0000000007570000-0x0000000007613000-memory.dmp

memory/1400-184-0x00000000078A0000-0x00000000078B1000-memory.dmp

memory/1400-185-0x0000000006140000-0x0000000006154000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 aad19e815132d8314683c218ba869001
SHA1 8b17db43a2fdd547b61d6a1e68f775f23839c5ea
SHA256 6ec8e0a8ef87051de11b9d3c21a17687db5a58421dc11a03cf5c3d8c42fb6fd2
SHA512 0a425e6ae97dc5e692be11bda1bc21ba45fe0f7cc2cbc3af7b81b557489541d09aabb30e46ecdf706b196394c263d248617cb58a6a96bbf4124f4709cc4d67fa

memory/3004-198-0x0000000071450000-0x00000000717A4000-memory.dmp

memory/3004-197-0x0000000070CA0000-0x0000000070CEC000-memory.dmp

memory/4488-209-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4804-216-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/688-222-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/688-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3460-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4488-224-0x00000000029D0000-0x0000000002DCC000-memory.dmp

memory/4804-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3460-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4804-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3460-239-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4804-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-253-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-257-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-261-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-265-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-269-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4804-273-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 04:26

Reported

2024-05-16 04:28

Platform

win11-20240508-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4628 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4628 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4628 wrote to memory of 2328 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 3504 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\system32\cmd.exe
PID 2340 wrote to memory of 3504 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\system32\cmd.exe
PID 3504 wrote to memory of 4700 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3504 wrote to memory of 4700 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2340 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2340 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 2340 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 2340 wrote to memory of 2788 N/A C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe C:\Windows\rss\csrss.exe
PID 2788 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 4836 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3456 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3456 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3456 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3052 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3052 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 3052 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2788 wrote to memory of 4120 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2788 wrote to memory of 4120 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3724 wrote to memory of 1060 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3724 wrote to memory of 1060 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3724 wrote to memory of 1060 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1060 wrote to memory of 1744 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1060 wrote to memory of 1744 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1060 wrote to memory of 1744 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2328 -ip 2328

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 2480

C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe

"C:\Users\Admin\AppData\Local\Temp\73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 6c0fdeb6-e173-456b-ba56-db4c4ff91729.uuid.myfastupdate.org udp
US 8.8.8.8:53 server4.myfastupdate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.111:443 server4.myfastupdate.org tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.111:443 server4.myfastupdate.org tcp
BG 185.82.216.111:443 server4.myfastupdate.org tcp
N/A 2.18.190.77:80 tcp
N/A 192.229.221.95:80 tcp

Files

memory/4628-1-0x0000000002A20000-0x0000000002E22000-memory.dmp

memory/4628-2-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/4628-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2328-4-0x000000007423E000-0x000000007423F000-memory.dmp

memory/2328-5-0x00000000021E0000-0x0000000002216000-memory.dmp

memory/2328-7-0x0000000004DB0000-0x00000000053DA000-memory.dmp

memory/2328-6-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/2328-8-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/2328-9-0x0000000004D60000-0x0000000004D82000-memory.dmp

memory/2328-10-0x0000000005450000-0x00000000054B6000-memory.dmp

memory/2328-11-0x00000000054C0000-0x0000000005526000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zn5atxko.0b1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2328-20-0x0000000005530000-0x0000000005887000-memory.dmp

memory/2328-21-0x0000000005A00000-0x0000000005A1E000-memory.dmp

memory/2328-22-0x0000000005A50000-0x0000000005A9C000-memory.dmp

memory/2328-23-0x0000000005F80000-0x0000000005FC6000-memory.dmp

memory/2328-24-0x0000000006E10000-0x0000000006E44000-memory.dmp

memory/2328-25-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/2328-36-0x0000000006E70000-0x0000000006E8E000-memory.dmp

memory/2328-27-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/2328-26-0x0000000070620000-0x0000000070977000-memory.dmp

memory/2328-37-0x0000000006E90000-0x0000000006F34000-memory.dmp

memory/2328-38-0x0000000007600000-0x0000000007C7A000-memory.dmp

memory/2328-39-0x0000000006FC0000-0x0000000006FDA000-memory.dmp

memory/2328-40-0x0000000007000000-0x000000000700A000-memory.dmp

memory/2328-41-0x0000000074230000-0x00000000749E1000-memory.dmp

memory/2340-43-0x0000000002A20000-0x0000000002E19000-memory.dmp

memory/1508-52-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/1508-53-0x0000000070620000-0x0000000070977000-memory.dmp

memory/1508-62-0x00000000078A0000-0x0000000007944000-memory.dmp

memory/1508-63-0x0000000007CA0000-0x0000000007D36000-memory.dmp

memory/1508-64-0x0000000007BD0000-0x0000000007BE1000-memory.dmp

memory/4628-65-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1508-66-0x0000000007C10000-0x0000000007C1E000-memory.dmp

memory/1508-67-0x0000000007C20000-0x0000000007C35000-memory.dmp

memory/1508-68-0x0000000007C60000-0x0000000007C7A000-memory.dmp

memory/1508-69-0x0000000007C80000-0x0000000007C88000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/4612-73-0x0000000005AE0000-0x0000000005E37000-memory.dmp

memory/4628-83-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/4628-82-0x0000000002A20000-0x0000000002E22000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0781b507775baaeaa2a7eedff4e294b2
SHA1 dc857e6e2cca98af9f56980f0c82a26176a64951
SHA256 c59067962b8698da95b4f7d6fa264df8d6ce630f57bb6d556c41c60f14db14a1
SHA512 88affbe4fcc4b3304c3a2566fad18452d70851c7adbae69f795cc6c7b782a3900905d0632dd44eac858bef892efe36b5922ebe4cd42aeee6861d5e30228aa897

memory/4612-85-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/4612-86-0x00000000706D0000-0x0000000070A27000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 07259fe89eb99d7257eff42eff595790
SHA1 7f4469ecfc8e9dc8bde486c5f53006ac3ff919e2
SHA256 b415499c051b0f653060a6f08c7c97a5357e94fc15562f4c8497d338e6e02b09
SHA512 49023f3066dfc099fd1c770cdb00f6133bd80446cd6d32704f16ebf1fff15733b416a35f468a14e821a30981a75cca311039937b30f0daf2c025ca8e66697613

memory/2000-105-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/2000-106-0x0000000070620000-0x0000000070977000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 d142e671eded49f4bf539b2b1218b313
SHA1 78661927b47b3a4eb0c091eb325a69b2727c1360
SHA256 73c0e967b3fc7caef61bb93b86d3647a8b6d4f6c584dc6230e43d0e1ee5eb24b
SHA512 5a7ad1249fa322ce05a6528f927f424e33d649d0e2cf5f0127eacd6cf02aa420f76ff848469674678cbf1ed220d2155cea580e24acd7c0d31587856f10a21a7e

memory/2340-121-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 176e378b059cb22dc2419b0af2c3bae2
SHA1 1067d6c4dfddfcded2d16c30c6f8114dd0489fe4
SHA256 1ffab390bfa6bbe16c05a65a1b581c398f3265885b006c1405fc7d278ef7c673
SHA512 775acca5af44bfe025af5edd5e5d0df3213d57e0636d2f403948554a6858de540f8cdd5259be41b9a7f8873ec2fc596341bac5c65b279effdad8ef67bce2fea7

memory/4836-131-0x00000000704A0000-0x00000000704EC000-memory.dmp

memory/4836-132-0x0000000070620000-0x0000000070977000-memory.dmp

memory/3456-143-0x0000000005880000-0x0000000005BD7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 abb23548ea26669eb0613b11b82483eb
SHA1 9fb46d915dff9166fa9a85ce7195fcabc061b54c
SHA256 90029c253c590e38ba8c0de2fb9347d28a5fcabed3f8a0d99626f98d17cfdee5
SHA512 2018b88331a8f65b8dbc4d908f7acb26c6fea17da77e59b396d62b04c4ce482164e655444018ed0a0f5f2e65893fb265eceabd627cd797f907c1df63fd93f0a0

memory/3456-153-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

memory/3456-154-0x00000000703C0000-0x000000007040C000-memory.dmp

memory/3456-155-0x0000000070610000-0x0000000070967000-memory.dmp

memory/3456-164-0x0000000007090000-0x0000000007134000-memory.dmp

memory/3456-165-0x0000000007400000-0x0000000007411000-memory.dmp

memory/3456-166-0x0000000005C10000-0x0000000005C25000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 71e069c20db224015f6340e2c26438bb
SHA1 8b1631d123dbfa7050b130df7f3e517c49dfcd87
SHA256 36b738a0204742e4953824078a4e6daa82a20c445396da59e05eeaaef0093b80
SHA512 6137ca714bcab21e774cdff18d0055b07ce8b1b99e8bb851007f34d703a60de359f64833a71e9dc4c240e3dd2d62c66c37a0fd986f6e79ba0e743c1940b2e6e0

memory/3052-177-0x00000000703C0000-0x000000007040C000-memory.dmp

memory/3052-178-0x0000000070610000-0x0000000070967000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2788-195-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2340-196-0x0000000002A20000-0x0000000002E19000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3724-200-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3548-203-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3724-205-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2788-207-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3548-211-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2788-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-216-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3548-218-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2788-220-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-223-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-227-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-239-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-242-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-248-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2788-251-0x0000000000400000-0x0000000000D1C000-memory.dmp