Analysis Overview
SHA256
380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69
Threat Level: Known bad
The file 380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69 was found to be: Known bad.
Malicious Activity Summary
Glupteba
Glupteba payload
Modifies Windows Firewall
Executes dropped EXE
UPX packed file
Checks installed software on the system
Manipulates WinMonFS driver.
Adds Run key to start application
Drops file in System32 directory
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Launches sc.exe
Command and Scripting Interpreter: PowerShell
Uses Task Scheduler COM API
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Modifies data under HKEY_USERS
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-16 15:48
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-16 15:48
Reported
2024-05-16 15:50
Platform
win10v2004-20240426-en
Max time kernel
149s
Max time network
146s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\rss\csrss.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe | N/A |
| N/A | N/A | C:\Windows\windefender.exe | N/A |
| N/A | N/A | C:\Windows\windefender.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Windows\rss\csrss.exe | N/A |
Checks installed software on the system
Manipulates WinMonFS driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMonFS | C:\Windows\rss\csrss.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| File created | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" | C:\Windows\windefender.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" | C:\Windows\windefender.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" | C:\Windows\windefender.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe
"C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe
"C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.137:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | c1ae786d-5889-46b4-a6d9-3fe741f0cfcc.uuid.dumppage.org | udp |
| NL | 23.62.61.137:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | stun.ipfire.org | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | server13.dumppage.org | udp |
| DE | 81.3.27.44:3478 | stun.ipfire.org | udp |
| BG | 185.82.216.111:443 | server13.dumppage.org | tcp |
| US | 162.159.133.233:443 | cdn.discordapp.com | tcp |
| US | 8.8.8.8:53 | 44.27.3.81.in-addr.arpa | udp |
| US | 8.8.8.8:53 | carsalessystem.com | udp |
| US | 104.21.94.82:443 | carsalessystem.com | tcp |
| US | 8.8.8.8:53 | 233.133.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 111.216.82.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.94.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| BG | 185.82.216.111:443 | server13.dumppage.org | tcp |
| US | 8.8.8.8:53 | 142.53.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| BG | 185.82.216.111:443 | server13.dumppage.org | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| BG | 185.82.216.111:443 | server13.dumppage.org | tcp |
| N/A | 127.0.0.1:31465 | tcp |
Files
memory/4280-1-0x0000000002920000-0x0000000002D26000-memory.dmp
memory/4280-2-0x0000000002D30000-0x000000000361B000-memory.dmp
memory/4280-3-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4808-4-0x0000000074A5E000-0x0000000074A5F000-memory.dmp
memory/4808-5-0x0000000003250000-0x0000000003286000-memory.dmp
memory/4808-7-0x0000000074A50000-0x0000000075200000-memory.dmp
memory/4808-6-0x00000000058D0000-0x0000000005EF8000-memory.dmp
memory/4808-8-0x0000000074A50000-0x0000000075200000-memory.dmp
memory/4808-9-0x0000000005750000-0x0000000005772000-memory.dmp
memory/4808-10-0x0000000005F70000-0x0000000005FD6000-memory.dmp
memory/4808-11-0x00000000060D0000-0x0000000006136000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rc122bpg.aqq.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4808-21-0x0000000006240000-0x0000000006594000-memory.dmp
memory/4808-22-0x0000000006810000-0x000000000682E000-memory.dmp
memory/4808-23-0x0000000006860000-0x00000000068AC000-memory.dmp
memory/4808-24-0x0000000006C60000-0x0000000006CA4000-memory.dmp
memory/4808-25-0x0000000007A00000-0x0000000007A76000-memory.dmp
memory/4808-27-0x0000000007980000-0x000000000799A000-memory.dmp
memory/4808-26-0x0000000008300000-0x000000000897A000-memory.dmp
memory/4808-30-0x0000000074A50000-0x0000000075200000-memory.dmp
memory/4808-42-0x0000000007DF0000-0x0000000007E93000-memory.dmp
memory/4808-41-0x0000000007DD0000-0x0000000007DEE000-memory.dmp
memory/4808-31-0x0000000070EA0000-0x00000000711F4000-memory.dmp
memory/4808-29-0x00000000708F0000-0x000000007093C000-memory.dmp
memory/4808-44-0x0000000007EE0000-0x0000000007EEA000-memory.dmp
memory/4808-43-0x0000000074A50000-0x0000000075200000-memory.dmp
memory/4808-28-0x0000000007D90000-0x0000000007DC2000-memory.dmp
memory/4808-45-0x0000000008000000-0x0000000008096000-memory.dmp
memory/4808-46-0x0000000007F00000-0x0000000007F11000-memory.dmp
memory/4808-48-0x0000000007F60000-0x0000000007F74000-memory.dmp
memory/4808-47-0x0000000007F40000-0x0000000007F4E000-memory.dmp
memory/4808-49-0x0000000007FA0000-0x0000000007FBA000-memory.dmp
memory/4808-50-0x0000000007F90000-0x0000000007F98000-memory.dmp
memory/4808-53-0x0000000074A50000-0x0000000075200000-memory.dmp
memory/4280-55-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4280-56-0x0000000002D30000-0x000000000361B000-memory.dmp
memory/3048-58-0x0000000002980000-0x0000000002D7E000-memory.dmp
memory/2632-68-0x0000000005800000-0x0000000005B54000-memory.dmp
memory/2632-69-0x0000000005D30000-0x0000000005D7C000-memory.dmp
memory/2632-81-0x0000000006EC0000-0x0000000006F63000-memory.dmp
memory/2632-71-0x0000000070B70000-0x0000000070EC4000-memory.dmp
memory/2632-70-0x00000000709F0000-0x0000000070A3C000-memory.dmp
memory/2632-82-0x00000000071F0000-0x0000000007201000-memory.dmp
memory/2632-83-0x0000000007240000-0x0000000007254000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 968cb9309758126772781b83adb8a28f |
| SHA1 | 8da30e71accf186b2ba11da1797cf67f8f78b47c |
| SHA256 | 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a |
| SHA512 | 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3 |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 4fe27bc828a5a772d272b04c646a826e |
| SHA1 | 7675d14e4e9bb81edde369696a67b46805efff92 |
| SHA256 | 759c7d7993c68a3ecaca2cc879d75b0fa4fdd183f9e19cf6dbb6c2a07090e000 |
| SHA512 | 78b43885bd64e1cebdff209f86618a9ba7b13dce75f60c77ca5eb3c269d176a3ee67b1d760acc9e037a03caeead5b6b0a8be464a1d5f7acc2f08cbf34dbfbf11 |
memory/740-98-0x0000000070B70000-0x0000000070EC4000-memory.dmp
memory/740-97-0x00000000709F0000-0x0000000070A3C000-memory.dmp
memory/2196-118-0x00000000061F0000-0x0000000006544000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | ea161ce63fcc503cae9e301ead16b7ca |
| SHA1 | ab943baa1b65efc2357b5f80684fbea9ac332998 |
| SHA256 | f2833c334d954098fdeb9202c9a80182ead5a03146dd4a896fb8d69730586c04 |
| SHA512 | 3e6488e3acda4175c395890741ba782234841141a12be0b823a3c85ba945fa8439c2859a6bec0ee43e25891c91d035b28b4d9a70f1b91f47ae9662e3200284df |
memory/2196-120-0x00000000709F0000-0x0000000070A3C000-memory.dmp
memory/2196-121-0x0000000070B80000-0x0000000070ED4000-memory.dmp
C:\Windows\rss\csrss.exe
| MD5 | f54e4850f7ca83464834f3c522543e18 |
| SHA1 | b91886db22b1ff8745bd895685b34edffed61627 |
| SHA256 | 380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69 |
| SHA512 | 1725b557bfc525800d2b2d6bb2d22c148af7a765adb4afebdba1f885fdeea3612e60d61f7375167d054e1dadbad78d9c1132c7c8117cee21a3157d338666860b |
memory/3048-135-0x0000000000400000-0x0000000000D1C000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | cfa085ebc0f2d3766a555365b96cde55 |
| SHA1 | 11ab867b7e1986b08c8a15c65c9a3c4ec8dfa244 |
| SHA256 | c6332018d0ca10199d0c77bc60bed60f93ce60903e228f73c2398202479e4cd3 |
| SHA512 | 732ab9cb3eac3a29ce2631f9eeaa168127b9af364c7354abe4bf085f46df044b4fc786fc748dafe6554c64cc8a66eb1e0c2f1208a32c41f9b00e0e708055366b |
memory/3864-147-0x0000000005560000-0x00000000058B4000-memory.dmp
memory/3864-149-0x0000000006080000-0x00000000060CC000-memory.dmp
memory/3864-151-0x0000000071100000-0x0000000071454000-memory.dmp
memory/3864-150-0x0000000070950000-0x000000007099C000-memory.dmp
memory/3864-161-0x0000000006D70000-0x0000000006E13000-memory.dmp
memory/3864-162-0x0000000007060000-0x0000000007071000-memory.dmp
memory/3864-163-0x0000000005920000-0x0000000005934000-memory.dmp
memory/1216-170-0x00000000054A0000-0x00000000057F4000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | c6eb55e633b2b80af0171294eb73b677 |
| SHA1 | 122e09fed2bb75ee6dad13c5c8535a577f69ed5d |
| SHA256 | bd087747074fee31e2fbaf83d88870f75d0425f9ffee525880070a9ef8a47a14 |
| SHA512 | 7b215bba748466ffddd9b2ef20a5017090943f7f65348dd28c8843bd865cf5c301169261dc2f7015abd9d61f90c875cd7e062d6d847f7de0d9d1255fe1a463b1 |
memory/1216-176-0x0000000005DB0000-0x0000000005DFC000-memory.dmp
memory/1216-178-0x0000000071020000-0x0000000071374000-memory.dmp
memory/1216-177-0x0000000070870000-0x00000000708BC000-memory.dmp
memory/1216-188-0x0000000006DB0000-0x0000000006E53000-memory.dmp
memory/1216-189-0x0000000007120000-0x0000000007131000-memory.dmp
memory/1216-190-0x0000000005970000-0x0000000005984000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | b6fe4e9f71a229aaf6e8c794988a0d90 |
| SHA1 | da789d87c9c6dc6220eebac9c5dc4aabb80d4c85 |
| SHA256 | 91d1f52b76dd7ef04a4981dc27ba1a14cbca974bcb36b3f8a0c6a4bc5a7b3950 |
| SHA512 | 3422a853be39c7ac0d1694a56a85438562c1d7bdd251bc04092a8132be4a2e017136c68823c5043dcf70a1fb3c8a3855d6142434a276d36f6969e14359671331 |
memory/4220-201-0x0000000006270000-0x00000000065C4000-memory.dmp
memory/4220-204-0x00000000709F0000-0x0000000070D44000-memory.dmp
memory/4220-203-0x0000000070870000-0x00000000708BC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
| MD5 | d98e33b66343e7c96158444127a117f6 |
| SHA1 | bb716c5509a2bf345c6c1152f6e3e1452d39d50d |
| SHA256 | 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1 |
| SHA512 | 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5 |
memory/4812-220-0x0000000000400000-0x0000000000D1C000-memory.dmp
C:\Windows\windefender.exe
| MD5 | 8e67f58837092385dcf01e8a2b4f5783 |
| SHA1 | 012c49cfd8c5d06795a6f67ea2baf2a082cf8625 |
| SHA256 | 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa |
| SHA512 | 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec |
memory/3936-225-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/3028-227-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/3936-229-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/4812-230-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/3028-231-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/4812-232-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-234-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/3028-235-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/4812-236-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-238-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-240-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-242-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-244-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-246-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-248-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-250-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4812-252-0x0000000000400000-0x0000000000D1C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-16 15:48
Reported
2024-05-16 15:50
Platform
win11-20240426-en
Max time kernel
5s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
| Token: SeImpersonatePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1364 wrote to memory of 1452 | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1364 wrote to memory of 1452 | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 1364 wrote to memory of 1452 | N/A | C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe
"C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe
"C:\Users\Admin\AppData\Local\Temp\380dc1f14c8b7096f1c11c0c0060b7cc786f574c895c3fdecab526c490113b69.exe"
Network
Files
memory/1364-1-0x0000000002A40000-0x0000000002E3A000-memory.dmp
memory/1364-2-0x0000000002E40000-0x000000000372B000-memory.dmp
memory/1364-3-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/1452-4-0x000000007490E000-0x000000007490F000-memory.dmp
memory/1452-5-0x0000000002930000-0x0000000002966000-memory.dmp
memory/1452-7-0x0000000074900000-0x00000000750B1000-memory.dmp
memory/1452-6-0x00000000051D0000-0x00000000057FA000-memory.dmp
memory/1452-8-0x0000000004F60000-0x0000000004F82000-memory.dmp
memory/1452-11-0x0000000074900000-0x00000000750B1000-memory.dmp
memory/1452-10-0x00000000058F0000-0x0000000005956000-memory.dmp
memory/1452-9-0x0000000005000000-0x0000000005066000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yodu2b0v.eqe.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1452-20-0x0000000005960000-0x0000000005CB7000-memory.dmp
memory/1452-21-0x0000000005DF0000-0x0000000005E0E000-memory.dmp
memory/1452-22-0x0000000005EA0000-0x0000000005EEC000-memory.dmp
memory/1452-23-0x0000000006FA0000-0x0000000006FE6000-memory.dmp
memory/1452-36-0x0000000007270000-0x000000000728E000-memory.dmp
memory/1452-37-0x0000000007290000-0x0000000007334000-memory.dmp
memory/1452-27-0x0000000070DC0000-0x0000000071117000-memory.dmp
memory/1452-26-0x0000000074900000-0x00000000750B1000-memory.dmp
memory/1452-25-0x0000000070B70000-0x0000000070BBC000-memory.dmp
memory/1452-24-0x0000000007230000-0x0000000007264000-memory.dmp
memory/1452-38-0x0000000074900000-0x00000000750B1000-memory.dmp
memory/1452-39-0x0000000007A00000-0x000000000807A000-memory.dmp
memory/1452-40-0x00000000073C0000-0x00000000073DA000-memory.dmp
memory/1452-41-0x0000000007400000-0x000000000740A000-memory.dmp
memory/1452-42-0x00000000074C0000-0x0000000007556000-memory.dmp
memory/1452-43-0x0000000007430000-0x0000000007441000-memory.dmp
memory/1452-44-0x0000000007470000-0x000000000747E000-memory.dmp
memory/1452-45-0x0000000007480000-0x0000000007495000-memory.dmp
memory/1452-46-0x0000000007580000-0x000000000759A000-memory.dmp
memory/1452-47-0x0000000007570000-0x0000000007578000-memory.dmp
memory/1452-50-0x0000000074900000-0x00000000750B1000-memory.dmp
memory/4748-52-0x0000000002A90000-0x0000000002E91000-memory.dmp