Malware Analysis Report

2024-12-08 02:14

Sample ID 240516-mn36qsha45
Target 7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09
SHA256 7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09

Threat Level: Known bad

The file 7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09 was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba

Glupteba payload

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Checks for VirtualBox DLLs, possible anti-VM trick

Launches sc.exe

Drops file in Windows directory

Command and Scripting Interpreter: PowerShell

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Modifies data under HKEY_USERS

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 10:37

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 10:37

Reported

2024-05-16 10:40

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4868 wrote to memory of 2908 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4868 wrote to memory of 2908 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4868 wrote to memory of 2908 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 4600 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\system32\cmd.exe
PID 3900 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\system32\cmd.exe
PID 3456 wrote to memory of 2368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3456 wrote to memory of 2368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3900 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3900 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 3900 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 3900 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 212 wrote to memory of 2460 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 2460 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 2460 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 4600 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 4600 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 4600 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 3760 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 3760 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 3760 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 212 wrote to memory of 3464 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 212 wrote to memory of 3464 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3432 wrote to memory of 1948 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3432 wrote to memory of 1948 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3432 wrote to memory of 1948 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1948 wrote to memory of 4668 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1948 wrote to memory of 4668 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1948 wrote to memory of 4668 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.193:443 www.bing.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 193.61.62.23.in-addr.arpa udp
NL 23.62.61.193:443 www.bing.com tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 d0d9d233-b4fc-4910-ae2e-b51a58f1281b.uuid.filesdumpplace.org udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 server3.filesdumpplace.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.96:443 server3.filesdumpplace.org tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
N/A 127.0.0.1:3478 udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 25.14.97.104.in-addr.arpa udp
BG 185.82.216.96:443 server3.filesdumpplace.org tcp
US 8.8.8.8:53 stun.ipfire.org udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
BG 185.82.216.96:443 server3.filesdumpplace.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/4868-1-0x0000000002A10000-0x0000000002E0B000-memory.dmp

memory/4868-2-0x0000000002E10000-0x00000000036FB000-memory.dmp

memory/4868-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2908-4-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

memory/2908-5-0x0000000005330000-0x0000000005366000-memory.dmp

memory/2908-6-0x0000000005AF0000-0x0000000006118000-memory.dmp

memory/2908-7-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/2908-8-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/2908-9-0x0000000005A60000-0x0000000005A82000-memory.dmp

memory/2908-11-0x00000000062F0000-0x0000000006356000-memory.dmp

memory/2908-10-0x0000000006190000-0x00000000061F6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zluof5hr.ksy.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2908-21-0x0000000006360000-0x00000000066B4000-memory.dmp

memory/2908-22-0x0000000006910000-0x000000000692E000-memory.dmp

memory/2908-23-0x0000000006960000-0x00000000069AC000-memory.dmp

memory/2908-24-0x0000000006E50000-0x0000000006E94000-memory.dmp

memory/2908-25-0x0000000007C40000-0x0000000007CB6000-memory.dmp

memory/2908-26-0x0000000008340000-0x00000000089BA000-memory.dmp

memory/2908-27-0x0000000007CE0000-0x0000000007CFA000-memory.dmp

memory/2908-29-0x0000000070A40000-0x0000000070A8C000-memory.dmp

memory/2908-31-0x0000000070BC0000-0x0000000070F14000-memory.dmp

memory/2908-30-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/2908-41-0x0000000007ED0000-0x0000000007EEE000-memory.dmp

memory/2908-28-0x0000000007E90000-0x0000000007EC2000-memory.dmp

memory/2908-42-0x0000000007EF0000-0x0000000007F93000-memory.dmp

memory/2908-43-0x0000000007FE0000-0x0000000007FEA000-memory.dmp

memory/2908-44-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/2908-45-0x00000000080A0000-0x0000000008136000-memory.dmp

memory/2908-46-0x0000000008000000-0x0000000008011000-memory.dmp

memory/2908-47-0x0000000008040000-0x000000000804E000-memory.dmp

memory/2908-49-0x0000000008140000-0x000000000815A000-memory.dmp

memory/2908-48-0x0000000008050000-0x0000000008064000-memory.dmp

memory/2908-50-0x0000000008090000-0x0000000008098000-memory.dmp

memory/2908-53-0x0000000074BA0000-0x0000000075350000-memory.dmp

memory/3900-55-0x0000000002920000-0x0000000002D26000-memory.dmp

memory/4600-65-0x0000000005F20000-0x0000000006274000-memory.dmp

memory/4600-67-0x0000000071770000-0x0000000071AC4000-memory.dmp

memory/4600-77-0x0000000007810000-0x00000000078B3000-memory.dmp

memory/4600-66-0x0000000070A40000-0x0000000070A8C000-memory.dmp

memory/4600-78-0x0000000007AB0000-0x0000000007AC1000-memory.dmp

memory/4600-79-0x0000000007B00000-0x0000000007B14000-memory.dmp

memory/4868-82-0x0000000002A10000-0x0000000002E0B000-memory.dmp

memory/4868-83-0x0000000002E10000-0x00000000036FB000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 c9c2216b98ca9493def1e78bd613d137
SHA1 fe46a1fc2d5bcfc6260711db21811993e47aed4e
SHA256 80118ef604de07c89183d2687f07a0d0bd2ed8a6616e53665e8da5dc6b010621
SHA512 4ce9b6cf5bbb1620fcba53f60900aeb3cfb16e3e8bac3fe5b22e66532c3ea972af0aa479b01db70b5d171a73c5c6865475fcbfbaeedacef46bc7374580a1b318

memory/4404-95-0x0000000070A40000-0x0000000070A8C000-memory.dmp

memory/4404-96-0x0000000070BC0000-0x0000000070F14000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 13d81c440726dd05c778aab531b24047
SHA1 d193ea70b03908d4764a3ef45b28ee80832ab259
SHA256 2474675cad7ac8c24781718f9411a15e427882cb123ccbea6e8e0e217f0415e9
SHA512 c1bf17955baf042c3cb48595e0e0b4085d46dda41d4a99caddb709e5eca41b288f4d359738ea012fc4903e35fa45ece523433ca790aa0dbc3569aaa2c3c113b9

memory/4868-117-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3460-118-0x0000000070A40000-0x0000000070A8C000-memory.dmp

memory/3460-119-0x0000000070BC0000-0x0000000070F14000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 de097d845dab14b23a7bb3e734c11da7
SHA1 6a9d685b7890154f99e882426557dcdb77cea9cf
SHA256 7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09
SHA512 2ea6de5f30516aca6e1b456377f248916f8fe40e3bb50452d3a6100196af6b53845e598602980df19883bc6717d6125582951cb2f2200e5aa3a1977282efeb7f

memory/3900-133-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 f400bbc0e9759cae5b19602ee82cb134
SHA1 0582fa9ab228063ae0e8cff544ccf11707ba457d
SHA256 e2979a04486d137f94ea71bf94fc597be50b5623a8ba6ff284c777152bdc531e
SHA512 e5d7aae22dcaf08534ec32bf156c939c038108c9c2533ca7acf98727ea330ab41061f3b04ebc112c93ec8c616d94943d2cb3094fd18566c432a7a7b65aea4ff7

memory/2460-147-0x0000000070BC0000-0x0000000070F14000-memory.dmp

memory/2460-146-0x0000000070A40000-0x0000000070A8C000-memory.dmp

memory/4600-164-0x0000000005920000-0x0000000005C74000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d284b2ac25b17c4f26b859bdc8b5dad5
SHA1 6752f5ba8fa4dd9ff60f5d7a641234febc0f1fcc
SHA256 09674afacaf58903cb7e898d0eaaba3ca840e97e9a4ae33b159f7a22eb3531ed
SHA512 a16167cfed657f7cee7d792fe139773d6b196f5e854f0983ee6fc9d5f646927cead2d6f2ac0821db1915e4cee8dab628f6893f9116de88349eba105747d23506

memory/4600-169-0x0000000006020000-0x000000000606C000-memory.dmp

memory/4600-170-0x0000000070960000-0x00000000709AC000-memory.dmp

memory/4600-171-0x00000000710F0000-0x0000000071444000-memory.dmp

memory/4600-181-0x0000000007200000-0x00000000072A3000-memory.dmp

memory/4600-182-0x00000000075D0000-0x00000000075E1000-memory.dmp

memory/4600-183-0x0000000005DC0000-0x0000000005DD4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 aff2ce0300d593feb800bc736ad5e365
SHA1 49917e754539a73acbd1566f07464c0653c3e31b
SHA256 9c05edaf0b24a0a40e7ece6a5274c346727d4e56f2f52e390fd4e1e026fd0262
SHA512 bf87f3e6616a6c68b1b9156bf9f3dce8332b778ae389e591d7df0215f73bb378afdae2307c0e7d676fd9c44351eebc4b9c61234371f85cddc75e836f940b75b0

memory/3760-196-0x0000000070960000-0x00000000709AC000-memory.dmp

memory/3760-197-0x00000000710F0000-0x0000000071444000-memory.dmp

memory/212-208-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3432-218-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2228-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3432-223-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/212-224-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2228-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/212-226-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2228-232-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/212-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-236-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-248-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-250-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-253-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/212-256-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 10:37

Reported

2024-05-16 10:40

Platform

win11-20240419-en

Max time kernel

150s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" C:\Windows\windefender.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1152 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1152 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1152 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\system32\cmd.exe
PID 3704 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\system32\cmd.exe
PID 1580 wrote to memory of 1456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1580 wrote to memory of 1456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3704 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 3736 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 3736 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 3736 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3704 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 3704 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 3704 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe C:\Windows\rss\csrss.exe
PID 3592 wrote to memory of 4108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 4108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 4108 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 4688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 4688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 4688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 1500 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 1500 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 1500 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3592 wrote to memory of 2940 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3592 wrote to memory of 2940 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1200 wrote to memory of 2320 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1200 wrote to memory of 2320 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1200 wrote to memory of 2320 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 1296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2320 wrote to memory of 1296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2320 wrote to memory of 1296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe

"C:\Users\Admin\AppData\Local\Temp\7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 b714367f-be15-43d9-98f5-921a646a093e.uuid.filesdumpplace.org udp
US 8.8.8.8:53 server1.filesdumpplace.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
BG 185.82.216.96:443 server1.filesdumpplace.org tcp
US 15.197.250.192:3478 stun.sipgate.net udp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.96:443 server1.filesdumpplace.org tcp
BG 185.82.216.96:443 server1.filesdumpplace.org tcp

Files

memory/1152-1-0x0000000002A30000-0x0000000002E2D000-memory.dmp

memory/1152-2-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/1152-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1500-4-0x00000000749BE000-0x00000000749BF000-memory.dmp

memory/1500-5-0x0000000002FD0000-0x0000000003006000-memory.dmp

memory/1500-6-0x0000000005920000-0x0000000005F4A000-memory.dmp

memory/1500-7-0x00000000749B0000-0x0000000075161000-memory.dmp

memory/1500-8-0x00000000749B0000-0x0000000075161000-memory.dmp

memory/1500-9-0x0000000005510000-0x0000000005532000-memory.dmp

memory/1500-11-0x0000000005820000-0x0000000005886000-memory.dmp

memory/1500-10-0x00000000057B0000-0x0000000005816000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kzjuwqpv.p4y.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1500-20-0x0000000006050000-0x00000000063A7000-memory.dmp

memory/1500-21-0x00000000064B0000-0x00000000064CE000-memory.dmp

memory/1500-22-0x0000000006500000-0x000000000654C000-memory.dmp

memory/1500-23-0x0000000007630000-0x0000000007676000-memory.dmp

memory/1500-26-0x00000000749B0000-0x0000000075161000-memory.dmp

memory/1500-25-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/1500-24-0x00000000078C0000-0x00000000078F4000-memory.dmp

memory/1500-36-0x0000000007920000-0x000000000793E000-memory.dmp

memory/1500-27-0x0000000070E30000-0x0000000071187000-memory.dmp

memory/1500-37-0x0000000007940000-0x00000000079E4000-memory.dmp

memory/1500-38-0x00000000749B0000-0x0000000075161000-memory.dmp

memory/1500-40-0x0000000007A70000-0x0000000007A8A000-memory.dmp

memory/1500-39-0x00000000080B0000-0x000000000872A000-memory.dmp

memory/1500-41-0x0000000007AB0000-0x0000000007ABA000-memory.dmp

memory/1500-42-0x0000000007BC0000-0x0000000007C56000-memory.dmp

memory/1500-43-0x0000000007AD0000-0x0000000007AE1000-memory.dmp

memory/1500-44-0x0000000007B20000-0x0000000007B2E000-memory.dmp

memory/1500-45-0x0000000007B30000-0x0000000007B45000-memory.dmp

memory/1500-46-0x0000000007B80000-0x0000000007B9A000-memory.dmp

memory/1500-47-0x0000000007C60000-0x0000000007C68000-memory.dmp

memory/1500-50-0x00000000749B0000-0x0000000075161000-memory.dmp

memory/3704-53-0x0000000002A70000-0x0000000002E6D000-memory.dmp

memory/1152-52-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2200-62-0x0000000005FD0000-0x0000000006327000-memory.dmp

memory/2200-63-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/2200-64-0x0000000070DA0000-0x00000000710F7000-memory.dmp

memory/2200-73-0x00000000076D0000-0x0000000007774000-memory.dmp

memory/2200-75-0x00000000079F0000-0x0000000007A01000-memory.dmp

memory/1152-74-0x0000000002A30000-0x0000000002E2D000-memory.dmp

memory/1152-76-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/2200-77-0x0000000007A40000-0x0000000007A55000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/2964-81-0x00000000059B0000-0x0000000005D07000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9cfd4befb17db2e8727afa59f8f788f1
SHA1 0e9f4525405ca71a43c902b2f1eb3a936756b15b
SHA256 9ae43fc2d8d1e7f332c43a58f22710f2936e18373eea5fb5b58e75485b882ce8
SHA512 33148c59f04820cf70ecfec78a37bce099ad97e29409e94aafa8136332faa207ef353c61a554d1b54ed4a7995d075148f275414ca841b91738b7adc919e673df

memory/2964-91-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/2964-92-0x0000000070E70000-0x00000000711C7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 871b511cb7fff6d964bf497cf3c2da6d
SHA1 6a96e435f35368e17873541ee3d4f43cd09d8b84
SHA256 6a54feb409d7c66d8b0efa7d3865648f2fc42381307baca417110512b2a802df
SHA512 9b22b899e23af86de6358e6b0378c53661eea566f851fe99a0aa19886ffe9ca2e8f9b2e5769e542011707356d101c0bad7a01a1ac87490bb8fdadad53ca420e1

memory/3736-111-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/3736-112-0x0000000070E70000-0x00000000711C7000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 de097d845dab14b23a7bb3e734c11da7
SHA1 6a9d685b7890154f99e882426557dcdb77cea9cf
SHA256 7072697bbfe801658e5ce10642e62ac1d6e9f27527007e1e2a4446c6b26f0a09
SHA512 2ea6de5f30516aca6e1b456377f248916f8fe40e3bb50452d3a6100196af6b53845e598602980df19883bc6717d6125582951cb2f2200e5aa3a1977282efeb7f

memory/3704-125-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0de314198bcf91e291025f3774c96f00
SHA1 516d4f04667ecaff50414e67126c46b5c9f8b07e
SHA256 76be51eafd54294e4714df717423772979950bc287e4928b7cf85cee0782d1e3
SHA512 cc63542632c665ccc8431be459919caefd48b2a881a49759c2fa5dadb2a7769362dfea6eb93dfd366ede6ca3af29ba08d0bdb3c3d77853e24e29224cda7baee9

memory/4108-138-0x0000000070C20000-0x0000000070C6C000-memory.dmp

memory/4108-139-0x0000000070E70000-0x00000000711C7000-memory.dmp

memory/4688-149-0x0000000006290000-0x00000000065E7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e695eb9a8d62615de92b492d503e225b
SHA1 9cc10f2d5d65b19c6e44bd8401676adc192f45ef
SHA256 20765bcde9301d26d7482cbe13a5cf17dc1da4a8152ab902abe2d533361273e8
SHA512 216d5a015b2a6a910369831dad70a8a1a6c014316a9e12499513541669058149a70514148e69fc143707e6c2aaeada9159f7f2756aea4f9ce8f85a50b125f427

memory/4688-159-0x00000000068A0000-0x00000000068EC000-memory.dmp

memory/4688-160-0x0000000070B40000-0x0000000070B8C000-memory.dmp

memory/4688-161-0x0000000070D90000-0x00000000710E7000-memory.dmp

memory/4688-170-0x0000000007AA0000-0x0000000007B44000-memory.dmp

memory/4688-171-0x0000000007E50000-0x0000000007E61000-memory.dmp

memory/4688-172-0x0000000006650000-0x0000000006665000-memory.dmp

memory/1500-182-0x0000000006040000-0x0000000006397000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7c3fe555e74ff093ec431256b621003f
SHA1 9f54dfae894809b2a31bd4d757023b11eecb9a44
SHA256 e01e6cf188fe224945fab3b848b24f0a645bdcabb9aa95974d858ff6ded5a745
SHA512 530d4c4a9bc223be53319169cadb0c7133c5d6ad4597f75443706b6017138b24868bb4c6102fb3b2767cdd485a22f0cbea1666646a58bd8b4de83e79421fde0b

memory/1500-184-0x0000000070B40000-0x0000000070B8C000-memory.dmp

memory/1500-185-0x0000000070CF0000-0x0000000071047000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3592-201-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/1200-206-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3592-209-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1200-211-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1220-214-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3592-213-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-216-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1220-220-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3592-219-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-228-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-231-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-234-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3592-240-0x0000000000400000-0x0000000000D1C000-memory.dmp