Malware Analysis Report

2025-01-02 06:27

Sample ID 240516-lr9x1seg21
Target e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27
SHA256 e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27

Threat Level: Known bad

The file e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Adds Run key to start application

Manipulates WinMonFS driver.

Checks installed software on the system

Drops file in System32 directory

Drops file in Windows directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Command and Scripting Interpreter: PowerShell

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 09:47

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 09:47

Reported

2024-05-16 09:49

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 208 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 208 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 208 wrote to memory of 628 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\system32\cmd.exe
PID 3908 wrote to memory of 1620 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\system32\cmd.exe
PID 1620 wrote to memory of 1536 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1620 wrote to memory of 1536 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3908 wrote to memory of 2996 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 2996 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 2996 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3908 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 3908 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 3908 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 1012 wrote to memory of 3816 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 3816 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 3816 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2256 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2256 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2256 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 2856 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1012 wrote to memory of 4220 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1012 wrote to memory of 4220 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4520 wrote to memory of 3144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4520 wrote to memory of 3144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4520 wrote to memory of 3144 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3144 wrote to memory of 3396 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3144 wrote to memory of 3396 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3144 wrote to memory of 3396 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
BE 88.221.83.216:443 www.bing.com tcp
US 8.8.8.8:53 216.83.221.88.in-addr.arpa udp
BE 88.221.83.216:443 www.bing.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 547d0286-50c4-4003-88ba-b5389f48d8bf.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 139.53.16.96.in-addr.arpa udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 server11.databaseupgrade.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 233.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
BG 185.82.216.108:443 server11.databaseupgrade.ru tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp

Files

memory/208-1-0x0000000002960000-0x0000000002D60000-memory.dmp

memory/208-2-0x0000000002D60000-0x000000000364B000-memory.dmp

memory/208-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/628-4-0x0000000074D1E000-0x0000000074D1F000-memory.dmp

memory/628-5-0x00000000028B0000-0x00000000028E6000-memory.dmp

memory/628-7-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/628-6-0x0000000005010000-0x0000000005638000-memory.dmp

memory/628-8-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/628-9-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

memory/628-11-0x0000000005820000-0x0000000005886000-memory.dmp

memory/628-10-0x00000000057B0000-0x0000000005816000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2y45is1p.bfs.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/628-21-0x0000000005890000-0x0000000005BE4000-memory.dmp

memory/628-22-0x0000000005E80000-0x0000000005E9E000-memory.dmp

memory/628-23-0x0000000005F00000-0x0000000005F4C000-memory.dmp

memory/628-24-0x00000000063D0000-0x0000000006414000-memory.dmp

memory/628-25-0x0000000007180000-0x00000000071F6000-memory.dmp

memory/628-26-0x0000000007880000-0x0000000007EFA000-memory.dmp

memory/628-27-0x0000000007220000-0x000000000723A000-memory.dmp

memory/628-30-0x0000000071330000-0x0000000071684000-memory.dmp

memory/628-29-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

memory/628-28-0x00000000073E0000-0x0000000007412000-memory.dmp

memory/628-40-0x0000000007420000-0x000000000743E000-memory.dmp

memory/628-41-0x0000000007440000-0x00000000074E3000-memory.dmp

memory/628-42-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/628-43-0x0000000007530000-0x000000000753A000-memory.dmp

memory/628-44-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/628-45-0x0000000007640000-0x00000000076D6000-memory.dmp

memory/628-46-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/628-47-0x0000000007540000-0x0000000007551000-memory.dmp

memory/628-48-0x0000000007580000-0x000000000758E000-memory.dmp

memory/628-49-0x00000000075A0000-0x00000000075B4000-memory.dmp

memory/628-50-0x00000000075E0000-0x00000000075FA000-memory.dmp

memory/628-51-0x00000000075D0000-0x00000000075D8000-memory.dmp

memory/628-54-0x0000000074D10000-0x00000000754C0000-memory.dmp

memory/3908-57-0x0000000002A70000-0x0000000002E6B000-memory.dmp

memory/208-56-0x0000000002960000-0x0000000002D60000-memory.dmp

memory/208-58-0x0000000002D60000-0x000000000364B000-memory.dmp

memory/3948-68-0x0000000005A00000-0x0000000005D54000-memory.dmp

memory/3948-69-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

memory/3948-70-0x0000000070D30000-0x0000000071084000-memory.dmp

memory/3948-80-0x0000000007010000-0x00000000070B3000-memory.dmp

memory/3948-81-0x0000000007330000-0x0000000007341000-memory.dmp

memory/3948-82-0x0000000007380000-0x0000000007394000-memory.dmp

memory/208-85-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9d7312a6dcd363243433c4a6ff52936e
SHA1 e950e120ba85eb3d4153cc2ca7bfb24be7797989
SHA256 203a01f0ba8792fd66fd2d2692a19eac3e036ced9ae33342c2a1e3d7f433d677
SHA512 e443c48c3fe076249eddbd1739d4ef02af06ddba0784897c4d8f082c25bb8f8711e9bc6c534baa004be7d10528a94679b91052530b7e829ad0e40ca7c9c250ea

memory/2996-97-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

memory/2996-98-0x0000000071330000-0x0000000071684000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 240af1b168e5433e72d8b55e5e281ba4
SHA1 bd023b9f4ae87d1ae35158ea7018a232ed58e474
SHA256 f8531aa51f77b5d3b6e2c6d46998de48344f89bf4a51a98d2ab6661fc360c1ab
SHA512 fcb3b245009e33330609b854529c92c4a13ebe427543336f394d8b6505551e60c171d9f5c1352633f537b2b827f266819d442aeacfa689c51f39aca590b75ac7

memory/632-119-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

memory/632-120-0x0000000071330000-0x0000000071684000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 3c0fd43d71ce768214bc91d04beb6a29
SHA1 f5b3fee177084125811ab4e7736d9c0ce68e00e4
SHA256 e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27
SHA512 48570ec488f97b86261b9b1f19e9c08ad10c6f068fd646dbb98d4065f80ed3f34fdb4866352aeb6911245e9534dd88cf1ae4eb3c94072d49dff7f9b46855585e

memory/3908-134-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3816-137-0x0000000005D20000-0x0000000006074000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5d73ad9184af8abee076cf194745ebae
SHA1 1343bcf5a6883a20d302253989b3bde610bd3cf1
SHA256 6053df780afd274ae827f9bd698c232e56db943178c4ce9841ec036af5fcf065
SHA512 a8e6ae684f9c2db1a6945663530ef594a131ed2fce8312c813f8d93ef0eaa8f365c056f0935743c6a3265272501a636b497889fdcad3665a92279a407073583b

memory/3816-148-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

memory/3816-149-0x0000000071350000-0x00000000716A4000-memory.dmp

memory/2256-166-0x00000000058D0000-0x0000000005C24000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6744dff360506b79b4df3ef49479b242
SHA1 d277fbc1912780334b38a5d36512fd5d0f604768
SHA256 7f08d265cbecb1fa45ed8d8e94cd0131acaed9e7f1ee0c141e1ee602d48b42a9
SHA512 f0d4a069cb5f794987c052873d496e1ad5a785d9cdbcb10628a988389629e225e984d14c07d65ec8c795af4a358846c4f7e6a6e0e3c755da80c8af61455ff857

memory/2256-172-0x0000000005F80000-0x0000000005FCC000-memory.dmp

memory/2256-173-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/2256-174-0x0000000071260000-0x00000000715B4000-memory.dmp

memory/2256-184-0x00000000071B0000-0x0000000007253000-memory.dmp

memory/2256-185-0x00000000074F0000-0x0000000007501000-memory.dmp

memory/2256-186-0x0000000005D50000-0x0000000005D64000-memory.dmp

memory/2856-197-0x0000000005930000-0x0000000005C84000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 672690afcdc66a4baa329417750f017a
SHA1 b629175b1ae70c97e81ac4657a1807772c097cb0
SHA256 1dda021c8144f13f3778c40f8df51030b6ac454d0d7ab896d384bf8da5d593fe
SHA512 591e212e7bb9390cc546822868b20cecf095c879b70cb63c56dfec5c1b5b3ced1014710747bbd253c2e7bbd3211b43c7e2db5c47a2fe94941cbb40518ec5febc

memory/2856-199-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/2856-200-0x0000000070C70000-0x0000000070FC4000-memory.dmp

memory/1012-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/1012-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4520-222-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3740-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4520-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1012-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3740-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1012-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3740-236-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1012-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-244-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-250-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-253-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-256-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1012-259-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 09:47

Reported

2024-05-16 09:49

Platform

win11-20240419-en

Max time kernel

150s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4900 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4900 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4900 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4808 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4808 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4808 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\system32\cmd.exe
PID 4904 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\system32\cmd.exe
PID 3248 wrote to memory of 3384 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3248 wrote to memory of 3384 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4904 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 3136 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 4904 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 4904 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe C:\Windows\rss\csrss.exe
PID 4280 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 2164 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 3244 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 3244 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 3244 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 2652 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 2652 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 2652 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4280 wrote to memory of 4808 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4280 wrote to memory of 4808 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1772 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1772 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1772 wrote to memory of 3316 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3316 wrote to memory of 1992 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3316 wrote to memory of 1992 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3316 wrote to memory of 1992 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe

"C:\Users\Admin\AppData\Local\Temp\e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 4a3c3f37-a642-4c1c-bef4-8fa24125aa94.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 server13.databaseupgrade.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server13.databaseupgrade.ru tcp
US 74.125.250.129:19302 stun3.l.google.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.108:443 server13.databaseupgrade.ru tcp
BG 185.82.216.108:443 server13.databaseupgrade.ru tcp

Files

memory/4900-1-0x0000000002A40000-0x0000000002E48000-memory.dmp

memory/4900-2-0x0000000002E50000-0x000000000373B000-memory.dmp

memory/4900-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4372-4-0x000000007483E000-0x000000007483F000-memory.dmp

memory/4372-5-0x0000000004ED0000-0x0000000004F06000-memory.dmp

memory/4372-7-0x0000000005540000-0x0000000005B6A000-memory.dmp

memory/4372-6-0x0000000074830000-0x0000000074FE1000-memory.dmp

memory/4372-8-0x0000000074830000-0x0000000074FE1000-memory.dmp

memory/4372-9-0x00000000054B0000-0x00000000054D2000-memory.dmp

memory/4372-10-0x0000000005C20000-0x0000000005C86000-memory.dmp

memory/4372-11-0x0000000005E40000-0x0000000005EA6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4dpkgp0h.deo.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4372-20-0x0000000005EB0000-0x0000000006207000-memory.dmp

memory/4372-21-0x0000000006360000-0x000000000637E000-memory.dmp

memory/4372-22-0x00000000063B0000-0x00000000063FC000-memory.dmp

memory/4372-23-0x00000000068E0000-0x0000000006926000-memory.dmp

memory/4372-26-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

memory/4372-24-0x0000000007770000-0x00000000077A4000-memory.dmp

memory/4372-25-0x0000000074830000-0x0000000074FE1000-memory.dmp

memory/4372-27-0x0000000070C30000-0x0000000070F87000-memory.dmp

memory/4372-36-0x00000000077D0000-0x00000000077EE000-memory.dmp

memory/4372-38-0x0000000074830000-0x0000000074FE1000-memory.dmp

memory/4372-37-0x00000000077F0000-0x0000000007894000-memory.dmp

memory/4372-39-0x0000000007F60000-0x00000000085DA000-memory.dmp

memory/4372-40-0x0000000007920000-0x000000000793A000-memory.dmp

memory/4372-41-0x0000000007960000-0x000000000796A000-memory.dmp

memory/4372-42-0x0000000007A20000-0x0000000007AB6000-memory.dmp

memory/4372-43-0x0000000007990000-0x00000000079A1000-memory.dmp

memory/4372-44-0x00000000079D0000-0x00000000079DE000-memory.dmp

memory/4372-45-0x00000000079E0000-0x00000000079F5000-memory.dmp

memory/4372-46-0x0000000007AE0000-0x0000000007AFA000-memory.dmp

memory/4372-47-0x0000000007B00000-0x0000000007B08000-memory.dmp

memory/4372-50-0x0000000074830000-0x0000000074FE1000-memory.dmp

memory/4904-53-0x0000000002A70000-0x0000000002E76000-memory.dmp

memory/4900-52-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4808-62-0x00000000062E0000-0x0000000006637000-memory.dmp

memory/4808-63-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

memory/4808-64-0x0000000070CD0000-0x0000000071027000-memory.dmp

memory/4808-73-0x0000000007930000-0x00000000079D4000-memory.dmp

memory/4900-74-0x0000000002A40000-0x0000000002E48000-memory.dmp

memory/4808-76-0x0000000007E80000-0x0000000007E91000-memory.dmp

memory/4900-75-0x0000000002E50000-0x000000000373B000-memory.dmp

memory/4808-77-0x0000000007ED0000-0x0000000007EE5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8617248f4dcdb7903687a17920fcea62
SHA1 8eda306673badffa1e452d605bd072cc52d03909
SHA256 614c2aced3af91ad7504df52bbae019246edaf5d8830b03701765a23dda5e5ff
SHA512 2726ef55357366fc0c9a7cad839b17a751369f0f80703edd9b0d0d2d8a6f65eb7968973ef52d2cdc6aba43ab5bdb73cab2e5cff9bb57410b864c76f29acc0c60

memory/2388-91-0x0000000070CD0000-0x0000000071027000-memory.dmp

memory/2388-90-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

memory/3136-109-0x0000000005600000-0x0000000005957000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5ad9328fb58b1e91656ef451f84ff8ec
SHA1 0ab13d01a7d8e5da105bdacf719330cb617c46d8
SHA256 d38a668bbae73a01b8dde320ec41a17152d47886f1fc682581f899c2c4a16d95
SHA512 3b71399f2a72145265ef14b6a22de6a82421c0684936372b3877bb209bf9117801b2732d0104760ed6e5f8f0ae7cb34a26ccfde45faf9537bae173c8ad811d18

memory/3136-112-0x0000000070C20000-0x0000000070F77000-memory.dmp

memory/3136-111-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 3c0fd43d71ce768214bc91d04beb6a29
SHA1 f5b3fee177084125811ab4e7736d9c0ce68e00e4
SHA256 e71fe768f65495d29051dfe207ee2996c47ec1c39a9d5154cbc1fcf670e7ed27
SHA512 48570ec488f97b86261b9b1f19e9c08ad10c6f068fd646dbb98d4065f80ed3f34fdb4866352aeb6911245e9534dd88cf1ae4eb3c94072d49dff7f9b46855585e

memory/4904-125-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a0459d69e7fe155ce8cf4ac0e05273b4
SHA1 e81f0540ff384f571558fca00bf4a14c5f820f69
SHA256 bbd2cea355cd06cee38cb6d93a5f6e026d7868627f29a41c04e14ddde2ab2a2c
SHA512 dd727d1cad8f05ef64d189276b7d03b86eb421715fb82c130af7ecd7eb2c3a069c10bb359dd5a9c5e1bc8108cafbbe81220fb2d90eea0cfa6d1fcba291e98ec8

memory/2164-138-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

memory/2164-139-0x0000000070C20000-0x0000000070F77000-memory.dmp

memory/3244-157-0x0000000005740000-0x0000000005A97000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 65dacb8189437c9341f2072369329416
SHA1 e39b71f23a1186309913baf53fa03a808434e541
SHA256 24345f414c96e236e82a329852362ef7622825255a8317bfa7f4432bcd49237a
SHA512 6f079fcc149a3e6db49dbbba13989c19e5681be2e9f28721fc575a02a95b807eb715d9912bccd2012ea1698e9e16d24718bb4e7b022c24e2dc3ca6040bfe63e7

memory/3244-159-0x0000000006170000-0x00000000061BC000-memory.dmp

memory/3244-160-0x00000000709C0000-0x0000000070A0C000-memory.dmp

memory/3244-161-0x0000000070B40000-0x0000000070E97000-memory.dmp

memory/3244-170-0x0000000006F40000-0x0000000006FE4000-memory.dmp

memory/3244-171-0x0000000007060000-0x0000000007071000-memory.dmp

memory/3244-172-0x0000000005690000-0x00000000056A5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 20610a639e6e985678c8de71c7e79a8e
SHA1 61b56d5936893f1a40e40de4bea35e0f8da18ef2
SHA256 7e0c0a1935d5bfa5744d954e05ee5092de2e6d8c761e459df914f95d32fb8281
SHA512 166160ebc3f9e0f74b5ff8f40f4107a4897058d1bcd0e9304b58c0cff039e873be27b16662c24f1323d23bd16c6dbb3dc494d3f5b0da71bfc8c5126e487e5cc5

memory/2652-184-0x00000000709C0000-0x0000000070A0C000-memory.dmp

memory/2652-185-0x0000000070B40000-0x0000000070E97000-memory.dmp

memory/4280-195-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4280-205-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1772-206-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1772-210-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4280-212-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3844-213-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4280-215-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3844-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4280-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-224-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-227-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-236-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-239-0x0000000000400000-0x0000000000D1C000-memory.dmp