Malware Analysis Report

2024-12-08 02:04

Sample ID 240516-lxj9jsfd86
Target 01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2
SHA256 01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2

Threat Level: Known bad

The file 01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Manipulates WinMonFS driver.

Adds Run key to start application

Checks installed software on the system

Drops file in System32 directory

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Launches sc.exe

Command and Scripting Interpreter: PowerShell

Program crash

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Modifies data under HKEY_USERS

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 09:54

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 09:54

Reported

2024-05-16 09:57

Platform

win11-20240426-en

Max time kernel

150s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4188 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4188 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4188 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\system32\cmd.exe
PID 4048 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\system32\cmd.exe
PID 4076 wrote to memory of 1776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4076 wrote to memory of 1776 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4048 wrote to memory of 4364 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 4364 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 4364 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4048 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 4048 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 4048 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 1568 wrote to memory of 4620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 4620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 4620 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1496 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1496 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1496 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1508 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1508 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 1508 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1568 wrote to memory of 3892 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1568 wrote to memory of 3892 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 820 wrote to memory of 1776 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 820 wrote to memory of 1776 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 820 wrote to memory of 1776 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1776 wrote to memory of 4120 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1776 wrote to memory of 4120 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1776 wrote to memory of 4120 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3908 -ip 3908

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 2492

C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 bff160ed-466a-4491-a95b-dc166e636ae2.uuid.statstraffic.org udp
US 8.8.8.8:53 stun4.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun4.l.google.com udp
BG 185.82.216.104:443 server10.statstraffic.org tcp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.104:443 server10.statstraffic.org tcp
BG 185.82.216.104:443 server10.statstraffic.org tcp

Files

memory/4188-1-0x0000000002A20000-0x0000000002E22000-memory.dmp

memory/4188-2-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/4188-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3908-4-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

memory/3908-5-0x0000000000F60000-0x0000000000F96000-memory.dmp

memory/3908-6-0x0000000074BC0000-0x0000000075371000-memory.dmp

memory/3908-7-0x0000000004E50000-0x000000000547A000-memory.dmp

memory/3908-8-0x0000000004D30000-0x0000000004D52000-memory.dmp

memory/3908-10-0x00000000056A0000-0x0000000005706000-memory.dmp

memory/3908-9-0x0000000005530000-0x0000000005596000-memory.dmp

memory/3908-20-0x0000000005710000-0x0000000005A67000-memory.dmp

memory/3908-19-0x0000000074BC0000-0x0000000075371000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_luulyzek.1eh.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3908-21-0x0000000005BD0000-0x0000000005BEE000-memory.dmp

memory/3908-22-0x0000000005BF0000-0x0000000005C3C000-memory.dmp

memory/3908-23-0x0000000006120000-0x0000000006166000-memory.dmp

memory/3908-26-0x0000000074BC0000-0x0000000075371000-memory.dmp

memory/3908-25-0x0000000070E30000-0x0000000070E7C000-memory.dmp

memory/3908-24-0x0000000006FD0000-0x0000000007004000-memory.dmp

memory/3908-27-0x0000000070FC0000-0x0000000071317000-memory.dmp

memory/3908-36-0x0000000007030000-0x000000000704E000-memory.dmp

memory/3908-37-0x0000000007050000-0x00000000070F4000-memory.dmp

memory/3908-38-0x00000000077C0000-0x0000000007E3A000-memory.dmp

memory/3908-39-0x0000000007180000-0x000000000719A000-memory.dmp

memory/3908-40-0x00000000071C0000-0x00000000071CA000-memory.dmp

memory/3908-41-0x0000000074BC0000-0x0000000075371000-memory.dmp

memory/4048-43-0x0000000002A30000-0x0000000002E33000-memory.dmp

memory/4188-44-0x0000000002A20000-0x0000000002E22000-memory.dmp

memory/4048-45-0x0000000002E40000-0x000000000372B000-memory.dmp

memory/2784-54-0x0000000006280000-0x00000000065D7000-memory.dmp

memory/2784-65-0x00000000079D0000-0x0000000007A74000-memory.dmp

memory/2784-56-0x0000000071770000-0x0000000071AC7000-memory.dmp

memory/2784-55-0x0000000070E30000-0x0000000070E7C000-memory.dmp

memory/2784-66-0x0000000007DE0000-0x0000000007E76000-memory.dmp

memory/2784-67-0x0000000007D00000-0x0000000007D11000-memory.dmp

memory/2784-68-0x0000000007D40000-0x0000000007D4E000-memory.dmp

memory/2784-69-0x0000000007D50000-0x0000000007D65000-memory.dmp

memory/2784-70-0x0000000007D90000-0x0000000007DAA000-memory.dmp

memory/2784-71-0x0000000007DB0000-0x0000000007DB8000-memory.dmp

memory/4188-72-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8cf05c70159cb2927a699f01c574c0a4
SHA1 f083ed11c25691818033a9a889e526c7907572f4
SHA256 f8c75269a7dc26ae2f7a466e4c5458a7d8cd6062fa73f8238ca5767d7b3fcb4f
SHA512 5b9659e1da14c40aedbafa7db367a9190be63db35f6c2154fc5f85794271938898e202da572cff3d153996a90f57d277656f3e0d609a2583468bcc583c13eae8

memory/4364-84-0x0000000005680000-0x00000000059D7000-memory.dmp

memory/4364-87-0x0000000070FB0000-0x0000000071307000-memory.dmp

memory/4364-86-0x0000000070E30000-0x0000000070E7C000-memory.dmp

memory/3012-105-0x0000000005CB0000-0x0000000006007000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 4e17aa069c2f50e390056dea10613db2
SHA1 a7524c5195ac0d058ca7c13e446ce093f5e4011d
SHA256 cb1ca487d2e7fd553f7d6991672d1b1acc96558bd5ec4c03f8097e3e797dffc5
SHA512 3f8a3541d353b3a354550f520ae8fd18c8d68fe8a11bdd7b92cf9b97c03c92fc7f40a739a432f6f09ea0361d6352be08add6adb35f4aed73130283953ed3eb1d

memory/3012-108-0x0000000071020000-0x0000000071377000-memory.dmp

memory/3012-107-0x0000000070E30000-0x0000000070E7C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 1f493ef21db9de35567a2f325ba5fac2
SHA1 e16912651d3ba8ddbafdbee017b7e0a3f8ebefa8
SHA256 01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2
SHA512 24b34ab90b7569d0a31ebbb45c8550fc98b1957a154fb15432f5b4b3b490f80284952ee9bb98e47a4987f1394ef97246a6a54dcaf01d5ce225eddb65d9b32e7c

memory/4620-128-0x0000000005F60000-0x00000000062B7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ec4dd0b707b60aa3ba5d5a92f664ef81
SHA1 151921f40308e2a0e476d30ef6fe5de515606fde
SHA256 d93470192cc1ee506240821494dd1fac0a4dd53baf012c55fb0274e75858c54d
SHA512 4adb1bc7fc3b13024552fa4f89377658cfb10b0931094f80975d5a7ec46d85f424b83f49ed397d2828001a8b5d1821a151ec0d79713d212a4cb2baee379bcf27

memory/4620-133-0x0000000070E30000-0x0000000070E7C000-memory.dmp

memory/4620-134-0x0000000071060000-0x00000000713B7000-memory.dmp

memory/1496-150-0x0000000006440000-0x0000000006797000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5266a8ad52a4e61398a16bfc6dd9a5ef
SHA1 2b88ed61941e4ac1e9f7a37b4c734641e9a9ce66
SHA256 f3d83fc9269c23635b44cac386cd089c708af3041125b4b0ba79b7d0afef44bb
SHA512 4bd7728cd8344d9fef0582dce4abca0d6ddd106605e0ddeced1f368cf9f7897e1fc7c8a240716626c3ffd58b15ad64948e45b59dc490b157ebed5e344cd1d9fe

memory/1496-154-0x0000000006A60000-0x0000000006AAC000-memory.dmp

memory/1496-155-0x0000000070D50000-0x0000000070D9C000-memory.dmp

memory/1496-165-0x0000000007CA0000-0x0000000007D44000-memory.dmp

memory/1496-156-0x0000000070EF0000-0x0000000071247000-memory.dmp

memory/4048-167-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1496-168-0x0000000008030000-0x0000000008041000-memory.dmp

memory/1496-169-0x00000000067E0000-0x00000000067F5000-memory.dmp

memory/1508-176-0x00000000055C0000-0x0000000005917000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 be5105aa574c7f3253c7bc61e489e89c
SHA1 d804bc754422ca94ae65bd484b0277972060b69e
SHA256 0c217324a2bf7f7f4cfc590c0f63ea42a648a07d5a5fb7597041b21dccdb54e6
SHA512 003a69af0415e2041caa5dea59976e6e8a4f3b53a8f9736db5e7a7abb1298e2164392c4c34134afa70960fb77502f553c9f296a41b1598190fb32ea47e96a9f0

memory/1508-181-0x0000000070D50000-0x0000000070D9C000-memory.dmp

memory/1508-182-0x0000000070F60000-0x00000000712B7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/1568-197-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4048-203-0x0000000002A30000-0x0000000002E33000-memory.dmp

memory/820-205-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3392-207-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/820-209-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1568-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3392-213-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1568-214-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3392-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1568-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-226-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-234-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-243-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-246-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-250-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1568-254-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 09:54

Reported

2024-05-16 09:57

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4160 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4160 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4160 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1656 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 1256 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\system32\cmd.exe
PID 3604 wrote to memory of 1256 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\system32\cmd.exe
PID 1256 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1256 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3604 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3604 wrote to memory of 3320 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 3604 wrote to memory of 3320 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 3604 wrote to memory of 3320 N/A C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe C:\Windows\rss\csrss.exe
PID 3320 wrote to memory of 2300 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 2300 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 2300 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4572 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4572 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4572 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4480 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4480 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 4480 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3320 wrote to memory of 2300 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3320 wrote to memory of 2300 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4376 wrote to memory of 412 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4376 wrote to memory of 412 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4376 wrote to memory of 412 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 412 wrote to memory of 4684 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 412 wrote to memory of 4684 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 412 wrote to memory of 4684 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1032,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe

"C:\Users\Admin\AppData\Local\Temp\01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
BE 88.221.83.225:443 www.bing.com tcp
US 8.8.8.8:53 225.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 936918f1-b5dc-4255-b2a3-5fe32088c3db.uuid.statstraffic.org udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 139.53.16.96.in-addr.arpa udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 server12.statstraffic.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun2.l.google.com udp
BG 185.82.216.104:443 server12.statstraffic.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 104.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.104:443 server12.statstraffic.org tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
BG 185.82.216.104:443 server12.statstraffic.org tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp

Files

memory/4160-1-0x0000000002980000-0x0000000002D88000-memory.dmp

memory/4160-2-0x0000000002D90000-0x000000000367B000-memory.dmp

memory/4160-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1316-4-0x000000007406E000-0x000000007406F000-memory.dmp

memory/1316-5-0x0000000002F40000-0x0000000002F76000-memory.dmp

memory/1316-6-0x00000000055D0000-0x0000000005BF8000-memory.dmp

memory/1316-7-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1316-8-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1316-9-0x0000000005520000-0x0000000005542000-memory.dmp

memory/1316-11-0x0000000005ED0000-0x0000000005F36000-memory.dmp

memory/1316-10-0x0000000005DF0000-0x0000000005E56000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zjmqiyxx.jvt.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1316-21-0x0000000005F40000-0x0000000006294000-memory.dmp

memory/1316-22-0x0000000006500000-0x000000000651E000-memory.dmp

memory/1316-23-0x0000000006550000-0x000000000659C000-memory.dmp

memory/1316-24-0x00000000069B0000-0x00000000069F4000-memory.dmp

memory/1316-25-0x0000000007810000-0x0000000007886000-memory.dmp

memory/1316-26-0x0000000007F10000-0x000000000858A000-memory.dmp

memory/1316-27-0x00000000078C0000-0x00000000078DA000-memory.dmp

memory/1316-29-0x000000006FF00000-0x000000006FF4C000-memory.dmp

memory/1316-30-0x00000000700A0000-0x00000000703F4000-memory.dmp

memory/1316-40-0x0000000007AC0000-0x0000000007ADE000-memory.dmp

memory/1316-41-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1316-42-0x0000000007AE0000-0x0000000007B83000-memory.dmp

memory/1316-28-0x0000000007A80000-0x0000000007AB2000-memory.dmp

memory/1316-43-0x0000000007BD0000-0x0000000007BDA000-memory.dmp

memory/1316-44-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1316-45-0x0000000007CE0000-0x0000000007D76000-memory.dmp

memory/1316-46-0x0000000007BE0000-0x0000000007BF1000-memory.dmp

memory/1316-47-0x0000000007C20000-0x0000000007C2E000-memory.dmp

memory/1316-48-0x0000000007C40000-0x0000000007C54000-memory.dmp

memory/1316-49-0x0000000007C90000-0x0000000007CAA000-memory.dmp

memory/1316-50-0x0000000007C80000-0x0000000007C88000-memory.dmp

memory/1316-53-0x0000000074060000-0x0000000074810000-memory.dmp

memory/3604-55-0x0000000002A00000-0x0000000002E07000-memory.dmp

memory/1656-65-0x0000000005F40000-0x0000000006294000-memory.dmp

memory/1656-66-0x000000006FF00000-0x000000006FF4C000-memory.dmp

memory/1656-67-0x0000000070680000-0x00000000709D4000-memory.dmp

memory/1656-77-0x0000000007790000-0x0000000007833000-memory.dmp

memory/1656-78-0x0000000007AB0000-0x0000000007AC1000-memory.dmp

memory/1656-79-0x0000000007B00000-0x0000000007B14000-memory.dmp

memory/4160-82-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4160-84-0x0000000002D90000-0x000000000367B000-memory.dmp

memory/4160-83-0x0000000002980000-0x0000000002D88000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3644-95-0x0000000006530000-0x0000000006884000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8200ae618f50dd6ff9844cb758a7194a
SHA1 079829628fb26a106b6794325f4f5a9221d19ae4
SHA256 db5dc0925bb2467550f47c5edde5c2bd758456ecbfc1be4af19cc2c4d31cda0e
SHA512 a343af8a5c82ea82c81fc8a238f52d76cf99838b1e9ea752c199fb1f27f44ae4dfc9fc51025494da080b95d50b98cd91cc30871caac6fc306edd1a7bcc4c9463

memory/3644-97-0x000000006FF00000-0x000000006FF4C000-memory.dmp

memory/3644-98-0x0000000070080000-0x00000000703D4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 71b134bd570da4d12bfab8fd2db2eb17
SHA1 2946291d6191cea1c20e0a261d835267647704e3
SHA256 54fb4373c9e10dd974fceb914ab8010c2e4a717d3585cbf15eb3928857b7ba4a
SHA512 864c3e3f76924839d2220fa9b0111795b20edde05c853bfcb8f0cd0c49bc4a8e623db1857ec746b527f60ff2a72ff327cd2f7393cc2ffe2c401733e17b633df3

memory/4180-119-0x000000006FF00000-0x000000006FF4C000-memory.dmp

memory/4180-120-0x0000000070080000-0x00000000703D4000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 1f493ef21db9de35567a2f325ba5fac2
SHA1 e16912651d3ba8ddbafdbee017b7e0a3f8ebefa8
SHA256 01ac48ba3cb10c650f493710fd391044c01a5fb9d7c9b665178711e74128b4a2
SHA512 24b34ab90b7569d0a31ebbb45c8550fc98b1957a154fb15432f5b4b3b490f80284952ee9bb98e47a4987f1394ef97246a6a54dcaf01d5ce225eddb65d9b32e7c

memory/3604-135-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 eceef5130f836a2adfe427b73f1f24e2
SHA1 db8b5691bab22d46473c33157bd67206c77c8a7e
SHA256 838fe0dcd850537cd8785c7ae98511765652756330dad1aa9cf2a75e94dd7d10
SHA512 5706637ec10e730fb0c19f880cf7a4037ce0a4fb4be0dfd8c3131812cb7aade9ba6685304bd4e288b72d2b140e467396ec2b64b999180c2d221f16be8bb55dd9

memory/2300-147-0x000000006FF00000-0x000000006FF4C000-memory.dmp

memory/2300-148-0x0000000070080000-0x00000000703D4000-memory.dmp

memory/4572-168-0x00000000063A0000-0x00000000066F4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 72b8d4b500bcfb731fb48c67edd81062
SHA1 8b1a154bb907396960c96f1f45b453c2e480d3fd
SHA256 e2ab5aa88baae58cf97fd383923dcbcfa0d3c50489213129f66ee3e689c8a350
SHA512 f00e340a74eb8d3955660cde68077b371e7c5f348f2cd1d5cfeaac620e487c37e346cae8b1df768c1c7736d16233087d9c39bfe6782505d7cdcf221312f50b87

memory/4572-170-0x0000000006AE0000-0x0000000006B2C000-memory.dmp

memory/4572-172-0x000000006FE20000-0x000000006FE6C000-memory.dmp

memory/4572-183-0x0000000007B60000-0x0000000007C03000-memory.dmp

memory/4572-173-0x000000006FFA0000-0x00000000702F4000-memory.dmp

memory/4572-184-0x0000000007EC0000-0x0000000007ED1000-memory.dmp

memory/4572-185-0x0000000006720000-0x0000000006734000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6bc4de7ffab88372ef5accc018c76a3c
SHA1 fe82bff196c20df3b76656ac6316562572cbe5b2
SHA256 f634f3c054f11036ade4b3f1d2bc50170009c33d4182be409dee06ac17e418a0
SHA512 93f67f3bf2730ad87b04d3b868bb17b00cb03985af241a8e7a59677427d58c5f1d6af297582b0f31647c566e8c853c090bb460fa0bdedf010aa092c3a85c658c

memory/4480-197-0x000000006FE20000-0x000000006FE6C000-memory.dmp

memory/4480-198-0x000000006FFA0000-0x00000000702F4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3320-214-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4376-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4376-222-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3320-223-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2600-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3320-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-228-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2600-231-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3320-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-240-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-244-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-252-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3320-256-0x0000000000400000-0x0000000000D1C000-memory.dmp