Malware Analysis Report

2024-12-08 02:07

Sample ID 240516-pq159sdb97
Target 5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca
SHA256 5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca

Threat Level: Known bad

The file 5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Checks installed software on the system

Adds Run key to start application

Manipulates WinMonFS driver.

Drops file in System32 directory

Launches sc.exe

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Program crash

Command and Scripting Interpreter: PowerShell

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 12:32

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 12:32

Reported

2024-05-16 12:35

Platform

win11-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4516 wrote to memory of 3888 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4516 wrote to memory of 3888 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4516 wrote to memory of 3888 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 4092 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\system32\cmd.exe
PID 1360 wrote to memory of 4092 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\system32\cmd.exe
PID 4092 wrote to memory of 2216 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4092 wrote to memory of 2216 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1360 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 896 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 1360 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 1360 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 5108 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 1016 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 1016 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 1016 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 3512 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 3512 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 3512 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 5108 wrote to memory of 3176 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 5108 wrote to memory of 3176 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4816 wrote to memory of 3112 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4816 wrote to memory of 3112 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4816 wrote to memory of 3112 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3112 wrote to memory of 2436 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3112 wrote to memory of 2436 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3112 wrote to memory of 2436 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 adaf405a-b763-4481-bf25-5b6f23a45a17.uuid.dumppage.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server10.dumppage.org udp
US 74.125.250.129:19302 stun3.l.google.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.111:443 server10.dumppage.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.111:443 server10.dumppage.org tcp
BG 185.82.216.111:443 server10.dumppage.org tcp
BG 185.82.216.111:443 server10.dumppage.org tcp

Files

memory/4516-1-0x0000000002A40000-0x0000000002E3E000-memory.dmp

memory/4516-2-0x0000000002E40000-0x000000000372B000-memory.dmp

memory/4516-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3888-4-0x00000000744EE000-0x00000000744EF000-memory.dmp

memory/3888-5-0x00000000046A0000-0x00000000046D6000-memory.dmp

memory/3888-6-0x0000000004E50000-0x000000000547A000-memory.dmp

memory/3888-7-0x00000000744E0000-0x0000000074C91000-memory.dmp

memory/3888-8-0x00000000744E0000-0x0000000074C91000-memory.dmp

memory/3888-9-0x0000000004D90000-0x0000000004DB2000-memory.dmp

memory/3888-10-0x0000000005570000-0x00000000055D6000-memory.dmp

memory/3888-11-0x00000000055E0000-0x0000000005646000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hauduudr.bj2.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3888-20-0x0000000005650000-0x00000000059A7000-memory.dmp

memory/3888-21-0x0000000005B20000-0x0000000005B3E000-memory.dmp

memory/3888-22-0x0000000005BE0000-0x0000000005C2C000-memory.dmp

memory/3888-23-0x0000000006CE0000-0x0000000006D26000-memory.dmp

memory/3888-25-0x0000000070750000-0x000000007079C000-memory.dmp

memory/3888-24-0x0000000006F60000-0x0000000006F94000-memory.dmp

memory/3888-35-0x0000000006FA0000-0x0000000006FBE000-memory.dmp

memory/3888-26-0x00000000708D0000-0x0000000070C27000-memory.dmp

memory/3888-37-0x00000000744E0000-0x0000000074C91000-memory.dmp

memory/3888-36-0x0000000006FC0000-0x0000000007064000-memory.dmp

memory/3888-38-0x00000000744E0000-0x0000000074C91000-memory.dmp

memory/3888-39-0x0000000007730000-0x0000000007DAA000-memory.dmp

memory/3888-40-0x00000000070E0000-0x00000000070FA000-memory.dmp

memory/3888-41-0x0000000007120000-0x000000000712A000-memory.dmp

memory/3888-42-0x00000000071E0000-0x0000000007276000-memory.dmp

memory/3888-43-0x0000000007160000-0x0000000007171000-memory.dmp

memory/3888-44-0x0000000007190000-0x000000000719E000-memory.dmp

memory/3888-45-0x00000000071A0000-0x00000000071B5000-memory.dmp

memory/3888-46-0x00000000072A0000-0x00000000072BA000-memory.dmp

memory/3888-47-0x0000000007280000-0x0000000007288000-memory.dmp

memory/3888-50-0x00000000744E0000-0x0000000074C91000-memory.dmp

memory/1360-52-0x0000000002A30000-0x0000000002E2E000-memory.dmp

memory/2848-58-0x00000000056A0000-0x00000000059F7000-memory.dmp

memory/2848-62-0x0000000070750000-0x000000007079C000-memory.dmp

memory/2848-63-0x0000000070960000-0x0000000070CB7000-memory.dmp

memory/2848-72-0x0000000006DE0000-0x0000000006E84000-memory.dmp

memory/2848-73-0x0000000007100000-0x0000000007111000-memory.dmp

memory/4516-75-0x0000000002A40000-0x0000000002E3E000-memory.dmp

memory/4516-74-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2848-76-0x0000000007150000-0x0000000007165000-memory.dmp

memory/4516-79-0x0000000002E40000-0x000000000372B000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/896-81-0x0000000005F60000-0x00000000062B7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 39a2f6ddf0e2e20eb8e8276d223d7003
SHA1 6dd287e9611ba68e658349e8c9abad1f650ede2c
SHA256 c8bff2df5e7db6b6aac93f87d0205b842e330c38a532b452f3598798163b6f94
SHA512 baefb17d78f03c4b793f37d87555b026c48711699c477be28d2577a0b4e17c0bbf279fae792554a2cb8c51a5aaa6985b239966a44d68188950980ec2623b209c

memory/896-91-0x0000000070750000-0x000000007079C000-memory.dmp

memory/896-92-0x00000000709A0000-0x0000000070CF7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0af359cfd6a095ccda4b7584e99d834e
SHA1 84d46637f9b57e02d7fd6703501f19ae52a20d24
SHA256 3440b7b9d042ede79a9c50c3e8d66e26173da885c48c875edcab45939c0a016d
SHA512 e091cd882d90bf0017c5f19b1e23f4a87d9e093949c70a197915406780b351a345248c057fc1aea3b96ee47487a539a2f74212a4eaf4100f07d4eb5188a0b205

memory/232-111-0x0000000070750000-0x000000007079C000-memory.dmp

memory/232-112-0x00000000709A0000-0x0000000070CF7000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 457409521c05bf575c662be5060b53fc
SHA1 6cee697ea7bb8ae91c59d26965ff8ffb230dbe4e
SHA256 5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca
SHA512 21e16e6bea980acb36891bacfcdcb9afe4a714ed4f38d46561d6aaf54c97d81ecbb0dc3f4fb5e0df240825e20c8c9d979ab9ab4c3dde526479e1ae23edb89541

memory/1360-125-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4280-136-0x0000000006150000-0x00000000064A7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0633ccb99cf69939b31ba46257179fc5
SHA1 f1f2435afab7d3869148bd5c8b91c5af5ec6ed68
SHA256 514dac718470c17eaf2bdaca3c0d25a6a7a7dd0e0ad880fac8dd81810b859786
SHA512 28d1397666475af214f1f8fec4ec209f72313a81628ec97b4c3392fafff03b1aa6401610cca5486ebf333a026d2ef9c77709babb90cdeb61ee3898b4a14598a4

memory/4280-138-0x0000000070750000-0x000000007079C000-memory.dmp

memory/4280-139-0x0000000070980000-0x0000000070CD7000-memory.dmp

memory/1016-158-0x0000000005B10000-0x0000000005E67000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e2e9bbc2e8ad6030c8b604e35a37f2e4
SHA1 70201896fe7622c4b28bdbc6bf2853463c80f92c
SHA256 5379656da3215c63dd69e9ace346c34cc7e66a14662f965c911b00d09384e7e1
SHA512 2b5d0f2343ffbc3f44af936b718ed898e5915b9430688a66ac34d35e1e1351c68d7e9d2aa99e1364e95938fb5c579f780e4a7b790c4727828d2154695b846c31

memory/1016-160-0x00000000063E0000-0x000000000642C000-memory.dmp

memory/1016-161-0x0000000070670000-0x00000000706BC000-memory.dmp

memory/1016-162-0x00000000707F0000-0x0000000070B47000-memory.dmp

memory/1016-171-0x00000000072D0000-0x0000000007374000-memory.dmp

memory/1016-172-0x00000000075D0000-0x00000000075E1000-memory.dmp

memory/1016-173-0x0000000005A50000-0x0000000005A65000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d5a3da48de4574ddccb2cc5f0ed77447
SHA1 3231f9282d40d64fd5866fe4e21a8537c80ddfd1
SHA256 a3df8598a07ae999a9c9a2f824625d326d9c0306a3d2df95438d524acaf179db
SHA512 1f50a25634cbcbee62b312e025871e88aca63267b6992c4ef0c20fc99b85ba139c6a02721d86fd8c93a9e4d865e21af58a06fe18e62f5a3d5c8ddb2853ed9c57

memory/3512-184-0x0000000070670000-0x00000000706BC000-memory.dmp

memory/3512-185-0x00000000707F0000-0x0000000070B47000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/5108-200-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4816-205-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4816-209-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5108-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3424-213-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5108-212-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-215-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3424-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/5108-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-224-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-227-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-234-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-236-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-239-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/5108-242-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 12:32

Reported

2024-05-16 12:35

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-492 = "India Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" C:\Windows\windefender.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1712 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1712 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1712 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 4488 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\system32\cmd.exe
PID 1648 wrote to memory of 4488 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\system32\cmd.exe
PID 4488 wrote to memory of 4172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4488 wrote to memory of 4172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1648 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 4268 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 4268 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 4268 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1648 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 1648 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 1648 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe C:\Windows\rss\csrss.exe
PID 1176 wrote to memory of 3720 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 3720 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 3720 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 3616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 3616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 3616 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 2324 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 2324 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 2324 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1176 wrote to memory of 4820 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1176 wrote to memory of 4820 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 3588 wrote to memory of 3960 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3588 wrote to memory of 3960 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3588 wrote to memory of 3960 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 3960 wrote to memory of 3024 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3960 wrote to memory of 3024 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 3960 wrote to memory of 3024 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 880 -ip 880

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 2592

C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe

"C:\Users\Admin\AppData\Local\Temp\5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
BE 88.221.83.234:443 www.bing.com tcp
US 8.8.8.8:53 234.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 3baf4f17-ff8f-4c02-ad43-93d0e5c79d5b.uuid.dumppage.org udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 stun3.l.google.com udp
US 8.8.8.8:53 server13.dumppage.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.111:443 server13.dumppage.org tcp
US 162.159.135.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun3.l.google.com udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 233.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 111.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
BG 185.82.216.111:443 server13.dumppage.org tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
BG 185.82.216.111:443 server13.dumppage.org tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
BG 185.82.216.111:443 server13.dumppage.org tcp

Files

memory/1712-1-0x00000000029A0000-0x0000000002DA8000-memory.dmp

memory/1712-2-0x0000000002DB0000-0x000000000369B000-memory.dmp

memory/1712-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/880-4-0x000000007445E000-0x000000007445F000-memory.dmp

memory/880-5-0x00000000030E0000-0x0000000003116000-memory.dmp

memory/880-6-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/880-7-0x00000000058B0000-0x0000000005ED8000-memory.dmp

memory/880-8-0x0000000005710000-0x0000000005732000-memory.dmp

memory/880-9-0x0000000006010000-0x0000000006076000-memory.dmp

memory/880-15-0x00000000060F0000-0x0000000006156000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rhpifxlc.mn0.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/880-20-0x0000000006260000-0x00000000065B4000-memory.dmp

memory/880-21-0x00000000066B0000-0x00000000066CE000-memory.dmp

memory/880-22-0x0000000006710000-0x000000000675C000-memory.dmp

memory/880-23-0x0000000006C50000-0x0000000006C94000-memory.dmp

memory/880-24-0x00000000077E0000-0x0000000007856000-memory.dmp

memory/880-25-0x00000000080E0000-0x000000000875A000-memory.dmp

memory/880-26-0x0000000007A80000-0x0000000007A9A000-memory.dmp

memory/880-28-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/880-27-0x0000000007C40000-0x0000000007C72000-memory.dmp

memory/880-29-0x0000000070470000-0x00000000707C4000-memory.dmp

memory/880-40-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/880-39-0x0000000007C80000-0x0000000007C9E000-memory.dmp

memory/880-41-0x0000000007CA0000-0x0000000007D43000-memory.dmp

memory/880-42-0x0000000007D90000-0x0000000007D9A000-memory.dmp

memory/880-43-0x0000000074450000-0x0000000074C00000-memory.dmp

memory/1648-45-0x0000000002A10000-0x0000000002E0C000-memory.dmp

memory/1648-46-0x0000000002E10000-0x00000000036FB000-memory.dmp

memory/3584-47-0x0000000005740000-0x0000000005A94000-memory.dmp

memory/3584-57-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/3584-58-0x0000000070A70000-0x0000000070DC4000-memory.dmp

memory/3584-68-0x0000000006F30000-0x0000000006FD3000-memory.dmp

memory/1712-70-0x00000000029A0000-0x0000000002DA8000-memory.dmp

memory/1712-69-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3584-71-0x0000000007340000-0x00000000073D6000-memory.dmp

memory/3584-72-0x0000000007260000-0x0000000007271000-memory.dmp

memory/3584-73-0x00000000072C0000-0x00000000072CE000-memory.dmp

memory/3584-74-0x00000000072D0000-0x00000000072E4000-memory.dmp

memory/3584-75-0x0000000007310000-0x000000000732A000-memory.dmp

memory/3584-76-0x0000000007300000-0x0000000007308000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5e35c74b018ab46cfbc9a9d58da93d3d
SHA1 a333e47c4e660fbd632ced7f14336864d6ca0ebf
SHA256 dc726a52bf9fb2b66929c93ce8f4c32493d166036e56479206a5cd4cff8b7f1e
SHA512 f298a2e20d8b9cc7e42114cf4dbc9e215bc87c8a991b1e4f8685ea33f739093a38b7b4948a745e2f1df1d6ce1b001cebb4be30dfea340a5fdac54edf315848cb

memory/1292-90-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/1292-91-0x0000000070A70000-0x0000000070DC4000-memory.dmp

memory/1712-102-0x0000000002DB0000-0x000000000369B000-memory.dmp

memory/4268-112-0x0000000005B10000-0x0000000005E64000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6315bf4360054476d5a56cb03b0cabce
SHA1 f565bc83e67423e54e9470786c3c3080a82f790d
SHA256 4ec1897eb6aacfe9e1aec208e20b7c699ffc9de6db4eade2bf9e16cab2e1d862
SHA512 415d73a9c186bf7ea764b0250360d2c0c4e4512bf2468c0f25e21057783600f40008727e35b94f59cbaf3c7eb97a2bb2c2959159bb7b7a7e38ba467d8447f052

memory/4268-114-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/4268-115-0x00000000706F0000-0x0000000070A44000-memory.dmp

memory/1648-129-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 457409521c05bf575c662be5060b53fc
SHA1 6cee697ea7bb8ae91c59d26965ff8ffb230dbe4e
SHA256 5f8337088593e866b8f1f0c7c9d3ca207fda0a636a425241cff3ac3222128eca
SHA512 21e16e6bea980acb36891bacfcdcb9afe4a714ed4f38d46561d6aaf54c97d81ecbb0dc3f4fb5e0df240825e20c8c9d979ab9ab4c3dde526479e1ae23edb89541

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b4153e179d9648157346ee14c862dfd6
SHA1 558e1e3c90a2b41759c245881de45a08fd794a5f
SHA256 1d9b4727d8948b1a3ad8bb6fbe34d02e768e4b17c1ceec0ae0e7c0781537e166
SHA512 8988d7cfedd9b64afca5d74b5aa20dd8bc726cbded3d6a708faeeee17508939f0e3fce6e0fba8211c6b6bc853f9a440ccfb4398d1c23515a5853bec0f6ad7652

memory/3720-143-0x00000000702F0000-0x000000007033C000-memory.dmp

memory/3720-144-0x0000000070470000-0x00000000707C4000-memory.dmp

memory/3616-156-0x0000000005CB0000-0x0000000006004000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 bb7bc4f99fe1299d50a7c13f3497004a
SHA1 354242393988675a36d51759312bb8cb8db96f14
SHA256 62737e4190a1d99b34b8df3e99dbf4e8e63d3ea354d2fcc3a1128fabd89db393
SHA512 532d958dc640815bc3c74514467e74667767725afe17e1c2225589dc035428fc7545352d3a50f0842e76eb15fde3164a97dbbc661fb3808bbcdb89ce3fcfa1c3

memory/3616-166-0x0000000006890000-0x00000000068DC000-memory.dmp

memory/3616-167-0x0000000070210000-0x000000007025C000-memory.dmp

memory/3616-168-0x00000000709A0000-0x0000000070CF4000-memory.dmp

memory/3616-178-0x00000000075A0000-0x0000000007643000-memory.dmp

memory/3616-179-0x00000000078A0000-0x00000000078B1000-memory.dmp

memory/3616-180-0x0000000006130000-0x0000000006144000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 48b475be9828a8cad09206d359ccd106
SHA1 8eb4d821b8c9c4b395b688aa580d84136bf318cd
SHA256 5ad07cf1dea33cba8a880129b29e0e7557e4dcb7282381f7a529cada96b6d608
SHA512 2c742745242b84bdbfe1bd3d25e9660317a008303a0c265d775a612d6bf46d0e40e41acbe38dfb8f8be3eba2740e249cbbb30b388991620787ceb982c6daf6db

memory/2324-192-0x0000000070210000-0x000000007025C000-memory.dmp

memory/2324-193-0x00000000709A0000-0x0000000070CF4000-memory.dmp

memory/1176-204-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3588-216-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1176-215-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1152-219-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3588-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1176-223-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1152-224-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1176-226-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1152-230-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1176-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-244-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1176-250-0x0000000000400000-0x0000000000D1C000-memory.dmp