Malware Analysis Report

2024-12-08 02:20

Sample ID 240516-sy6bqsbc2v
Target 108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae
SHA256 108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae
Tags
glupteba discovery dropper evasion execution loader persistence rootkit upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae

Threat Level: Known bad

The file 108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae was found to be: Known bad.

Malicious Activity Summary

glupteba discovery dropper evasion execution loader persistence rootkit upx

Glupteba payload

Glupteba

Modifies Windows Firewall

Executes dropped EXE

UPX packed file

Adds Run key to start application

Checks installed software on the system

Manipulates WinMonFS driver.

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Command and Scripting Interpreter: PowerShell

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Modifies data under HKEY_USERS

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-16 15:33

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 15:33

Reported

2024-05-16 15:35

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

137s

Command Line

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4532 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4532 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4532 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 1568 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 644 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\system32\cmd.exe
PID 4520 wrote to memory of 644 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\system32\cmd.exe
PID 644 wrote to memory of 4180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 644 wrote to memory of 4180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4520 wrote to memory of 3492 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 3492 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 3492 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4520 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 4520 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 4520 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 4872 wrote to memory of 2592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 2592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 2592 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 3268 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 3268 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 3268 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 4772 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4872 wrote to memory of 4772 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 4812 wrote to memory of 1716 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4812 wrote to memory of 1716 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4812 wrote to memory of 1716 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1716 wrote to memory of 456 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1716 wrote to memory of 456 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1716 wrote to memory of 456 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.121:443 www.bing.com tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 121.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 19.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 8324533b-5ac1-419f-bc9d-8f6ef7ac3bff.uuid.filesdumpplace.org udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 server14.filesdumpplace.org udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
BG 185.82.216.96:443 server14.filesdumpplace.org tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 71.221.67.172.in-addr.arpa udp
N/A 127.0.0.1:3478 udp
BG 185.82.216.96:443 server14.filesdumpplace.org tcp
US 8.8.8.8:53 stun4.l.google.com udp
US 74.125.250.129:19302 stun4.l.google.com udp
US 8.8.8.8:53 129.250.125.74.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
BG 185.82.216.96:443 server14.filesdumpplace.org tcp

Files

memory/4532-1-0x0000000002950000-0x0000000002D4A000-memory.dmp

memory/4532-2-0x0000000002D50000-0x000000000363B000-memory.dmp

memory/4532-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4944-4-0x0000000074C1E000-0x0000000074C1F000-memory.dmp

memory/4944-5-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

memory/4944-6-0x0000000074C10000-0x00000000753C0000-memory.dmp

memory/4944-7-0x0000000005620000-0x0000000005C48000-memory.dmp

memory/4944-8-0x0000000074C10000-0x00000000753C0000-memory.dmp

memory/4944-9-0x00000000055D0000-0x00000000055F2000-memory.dmp

memory/4944-10-0x0000000005CC0000-0x0000000005D26000-memory.dmp

memory/4944-11-0x0000000005D30000-0x0000000005D96000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_alec5r5l.gwp.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4944-21-0x0000000005EA0000-0x00000000061F4000-memory.dmp

memory/4944-22-0x00000000063A0000-0x00000000063BE000-memory.dmp

memory/4944-23-0x00000000063F0000-0x000000000643C000-memory.dmp

memory/4944-24-0x0000000006950000-0x0000000006994000-memory.dmp

memory/4944-25-0x00000000076C0000-0x0000000007736000-memory.dmp

memory/4944-26-0x0000000007DC0000-0x000000000843A000-memory.dmp

memory/4944-27-0x0000000007770000-0x000000000778A000-memory.dmp

memory/4944-29-0x0000000070AB0000-0x0000000070AFC000-memory.dmp

memory/4944-31-0x0000000070C30000-0x0000000070F84000-memory.dmp

memory/4944-30-0x0000000074C10000-0x00000000753C0000-memory.dmp

memory/4944-28-0x0000000007930000-0x0000000007962000-memory.dmp

memory/4944-41-0x0000000007970000-0x000000000798E000-memory.dmp

memory/4944-42-0x0000000007990000-0x0000000007A33000-memory.dmp

memory/4944-43-0x0000000074C10000-0x00000000753C0000-memory.dmp

memory/4944-44-0x0000000007A80000-0x0000000007A8A000-memory.dmp

memory/4944-45-0x0000000007B40000-0x0000000007BD6000-memory.dmp

memory/4944-46-0x0000000007AA0000-0x0000000007AB1000-memory.dmp

memory/4944-47-0x0000000007AE0000-0x0000000007AEE000-memory.dmp

memory/4944-48-0x0000000007AF0000-0x0000000007B04000-memory.dmp

memory/4944-49-0x0000000007BE0000-0x0000000007BFA000-memory.dmp

memory/4944-50-0x0000000007B30000-0x0000000007B38000-memory.dmp

memory/4944-53-0x0000000074C10000-0x00000000753C0000-memory.dmp

memory/4520-55-0x0000000002920000-0x0000000002D1E000-memory.dmp

memory/4520-56-0x0000000002D20000-0x000000000360B000-memory.dmp

memory/1568-67-0x0000000070C30000-0x0000000070F84000-memory.dmp

memory/1568-66-0x0000000070AB0000-0x0000000070AFC000-memory.dmp

memory/1568-77-0x00000000070D0000-0x0000000007173000-memory.dmp

memory/1568-78-0x00000000073F0000-0x0000000007401000-memory.dmp

memory/1568-79-0x0000000007440000-0x0000000007454000-memory.dmp

memory/4532-80-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4532-81-0x0000000002950000-0x0000000002D4A000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3492-94-0x0000000005D90000-0x00000000060E4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3f50cded2964e41c8298cd5709f3a7c0
SHA1 86bbcef7bc2d8ca6c212e82d06e87e2d20e26387
SHA256 1dc7f9518541de4627c27bc4310ac69f1cc47483c7396b223f397ed8922832c1
SHA512 a9facf753864eb48c168b49f3048876cb783399ba0d9ee85d5ec39d1ac622e985cb88edb91cc54b8bd395a050ef13276e4bf05205142894021305aac3d28895d

memory/3492-96-0x0000000070AB0000-0x0000000070AFC000-memory.dmp

memory/3492-97-0x0000000070C50000-0x0000000070FA4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3b334bb21a82e8da3088a1a617467242
SHA1 62a1bcd495601434d471e08c1ea2027cc626d31d
SHA256 13d5879fdf4f704a31086325608e9b4e873d1d88697a74693aae8446a86e4bbe
SHA512 5a0ea77cf94520da5d1325918efceca015a1ee9fcccabbb10f5d9345c3845cd7636bd6119253d6f857465bfde4f6e07a4914db59d46f7efd37f051f11d049be2

memory/3752-119-0x0000000070C30000-0x0000000070F84000-memory.dmp

memory/3752-118-0x0000000070AB0000-0x0000000070AFC000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 1db79bf5a905bd7fe0d6da7026d75b7b
SHA1 de6073f281cd5551733de5b67a01444fa17f4cce
SHA256 108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae
SHA512 8913fc14ecba54ec668e7948264c700f0d70ee6cef23af63cce1dadbb4ddcfff86f91e74fcfcd951f3e36471e59fc68ab644ce1b7324532de141b86b063a375e

memory/4520-133-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2592-142-0x0000000005520000-0x0000000005874000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ac81d42c7bfc2e6a2502d83c22e3d501
SHA1 9f890bcc512c8458f2b8c3396df9445ee68514af
SHA256 b58758cf81b6c1225276ed6aa43dc2dc0316aadafe0b84f3858dd7598f5115c9
SHA512 88be98ca376eb64c81d7cd2d479bd9e5c2a5c5ef6cef993f531dfd8d519977093313b27421a4ca43015223b5c8681e67c0438a3a411bdf6abe3029d90f9f9ed4

memory/2592-148-0x0000000070AB0000-0x0000000070AFC000-memory.dmp

memory/2592-149-0x0000000071230000-0x0000000071584000-memory.dmp

memory/4280-169-0x0000000006160000-0x00000000064B4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d8b052ed2f7fdc3d2b4bca7ea653e75f
SHA1 0ac03936bbd7ca23dda55fb4a2b6ecb1819303f6
SHA256 aa45b2bd9adcd40e19313e30c8f1599326f1daaddb35680d0902093d5ac744af
SHA512 61f35b24beab1b031586f6c33dda76b11a0a28af5316144d612ab1f67668b380993749a4b2f1da081037e262ec2d2c972a6167583e95f5047a8de91445de2d82

memory/4280-171-0x0000000006BB0000-0x0000000006BFC000-memory.dmp

memory/4280-172-0x00000000709D0000-0x0000000070A1C000-memory.dmp

memory/4280-173-0x0000000070B50000-0x0000000070EA4000-memory.dmp

memory/4280-183-0x00000000078B0000-0x0000000007953000-memory.dmp

memory/4280-184-0x0000000007C10000-0x0000000007C21000-memory.dmp

memory/4280-185-0x0000000005FC0000-0x0000000005FD4000-memory.dmp

memory/3268-192-0x0000000005420000-0x0000000005774000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ea41c4b838891b038c2cc369a5a06751
SHA1 8cd094161aaabe13c3744bd681dce73ea55942bd
SHA256 a9827b061c84ea0507bb28e10d5ced2d8856ad53ce9b182491a1fe39d2264ded
SHA512 461842664d202ee8e9d0b801b910e41dba513a5a2228cacd290ef087f0e547af74b28725107a1bcb8ef3336cbf79b1c5cc0020405e18a30173bf5754ad6c1a2f

memory/3268-198-0x00000000709D0000-0x0000000070A1C000-memory.dmp

memory/3268-199-0x0000000070FB0000-0x0000000071304000-memory.dmp

memory/4872-209-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4872-220-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4812-221-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4372-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4812-227-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4872-228-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4372-230-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4872-232-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4372-236-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4872-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-240-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-243-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-247-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-250-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-252-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4872-255-0x0000000000400000-0x0000000000D1C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 15:33

Reported

2024-05-16 15:35

Platform

win11-20240508-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4556 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4556 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4556 wrote to memory of 1972 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 3108 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 3108 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 3108 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\system32\cmd.exe
PID 4724 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\system32\cmd.exe
PID 4988 wrote to memory of 3872 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4988 wrote to memory of 3872 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4724 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 4308 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 4308 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 4308 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4724 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 4724 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 4724 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe C:\Windows\rss\csrss.exe
PID 2028 wrote to memory of 4188 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 4188 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 4188 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 5000 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 5000 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 5000 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 3688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 3688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 3688 N/A C:\Windows\rss\csrss.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 2028 wrote to memory of 4280 N/A C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
PID 1928 wrote to memory of 4260 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1928 wrote to memory of 4260 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 1928 wrote to memory of 4260 N/A C:\Windows\windefender.exe C:\Windows\SysWOW64\cmd.exe
PID 4260 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4260 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4260 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe

"C:\Users\Admin\AppData\Local\Temp\108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun2.l.google.com udp
BG 185.82.216.96:443 server12.filesdumpplace.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
BG 185.82.216.96:443 server12.filesdumpplace.org tcp
BG 185.82.216.96:443 server12.filesdumpplace.org tcp
BG 185.82.216.96:443 server12.filesdumpplace.org tcp

Files

memory/4556-1-0x0000000002A20000-0x0000000002E21000-memory.dmp

memory/4556-2-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/4556-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1972-4-0x0000000074DAE000-0x0000000074DAF000-memory.dmp

memory/1972-5-0x0000000002D50000-0x0000000002D86000-memory.dmp

memory/1972-7-0x0000000074DA0000-0x0000000075551000-memory.dmp

memory/1972-6-0x0000000005970000-0x0000000005F9A000-memory.dmp

memory/1972-8-0x00000000056C0000-0x00000000056E2000-memory.dmp

memory/1972-9-0x0000000005760000-0x00000000057C6000-memory.dmp

memory/1972-10-0x00000000058C0000-0x0000000005926000-memory.dmp

memory/1972-11-0x0000000074DA0000-0x0000000075551000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3uifagoz.rjz.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1972-20-0x00000000060A0000-0x00000000063F7000-memory.dmp

memory/1972-21-0x0000000006590000-0x00000000065AE000-memory.dmp

memory/1972-22-0x00000000065D0000-0x000000000661C000-memory.dmp

memory/1972-23-0x0000000006B00000-0x0000000006B46000-memory.dmp

memory/1972-25-0x0000000071010000-0x000000007105C000-memory.dmp

memory/1972-26-0x0000000071240000-0x0000000071597000-memory.dmp

memory/1972-30-0x0000000074DA0000-0x0000000075551000-memory.dmp

memory/1972-36-0x00000000079F0000-0x0000000007A0E000-memory.dmp

memory/1972-24-0x0000000007990000-0x00000000079C4000-memory.dmp

memory/1972-37-0x0000000007A10000-0x0000000007AB4000-memory.dmp

memory/1972-38-0x0000000074DA0000-0x0000000075551000-memory.dmp

memory/1972-39-0x0000000008180000-0x00000000087FA000-memory.dmp

memory/1972-40-0x0000000007B40000-0x0000000007B5A000-memory.dmp

memory/1972-41-0x0000000007B80000-0x0000000007B8A000-memory.dmp

memory/1972-42-0x0000000007C90000-0x0000000007D26000-memory.dmp

memory/1972-43-0x0000000007BA0000-0x0000000007BB1000-memory.dmp

memory/1972-44-0x0000000007BF0000-0x0000000007BFE000-memory.dmp

memory/1972-45-0x0000000007C00000-0x0000000007C15000-memory.dmp

memory/1972-46-0x0000000007C50000-0x0000000007C6A000-memory.dmp

memory/1972-47-0x0000000007C70000-0x0000000007C78000-memory.dmp

memory/1972-50-0x0000000074DA0000-0x0000000075551000-memory.dmp

memory/4724-52-0x0000000002A30000-0x0000000002E36000-memory.dmp

memory/3108-53-0x00000000056D0000-0x0000000005A27000-memory.dmp

memory/3108-62-0x0000000071010000-0x000000007105C000-memory.dmp

memory/3108-63-0x0000000071260000-0x00000000715B7000-memory.dmp

memory/3108-72-0x0000000006E20000-0x0000000006EC4000-memory.dmp

memory/4556-74-0x0000000002A20000-0x0000000002E21000-memory.dmp

memory/4556-75-0x0000000002E30000-0x000000000371B000-memory.dmp

memory/4556-73-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/3108-76-0x0000000007150000-0x0000000007161000-memory.dmp

memory/3108-77-0x00000000071A0000-0x00000000071B5000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/1936-89-0x0000000005FE0000-0x0000000006337000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d4e1c0d54402ca6130948d2a2db6f380
SHA1 14710ac47479e5fc32bcb3791dca0a8a359a86bc
SHA256 40fb98a631dd4b2ad15f6652b7daec2bc29765aa4970d27c08e9cec9ff4d9fa9
SHA512 7f551aea0bee100c535c7e853ee0cf6e58288e22a9297913fc78a62dde99b35720c75e9c7654fe8eeac9caf809f61b198b38bc0fa3b9068f66909827bd064078

memory/1936-91-0x0000000071010000-0x000000007105C000-memory.dmp

memory/1936-92-0x0000000071220000-0x0000000071577000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 14879faa41be5259e6c71f93c3533a93
SHA1 274ab5cc8b008ba9349a6375a30443d131d8c8f3
SHA256 77e9c6b4c30b95e197688deb31b2bdd5c35158f228de6753ab28744dab3a9894
SHA512 5d9b17e86468317c50ebab0a20b73fe967133ec54501c17d2873800cc1527be68e56f79548bea7725555f5b0447f8a17b15fef71315df30c9dfedeb33b9d6bea

memory/4308-111-0x0000000071010000-0x000000007105C000-memory.dmp

memory/4308-112-0x0000000071260000-0x00000000715B7000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 1db79bf5a905bd7fe0d6da7026d75b7b
SHA1 de6073f281cd5551733de5b67a01444fa17f4cce
SHA256 108b238f255d5a2f03db79d65ec33f0b15f526c4e71195f5f4fe385cc049c3ae
SHA512 8913fc14ecba54ec668e7948264c700f0d70ee6cef23af63cce1dadbb4ddcfff86f91e74fcfcd951f3e36471e59fc68ab644ce1b7324532de141b86b063a375e

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9d4bc86560aae5dc641e6310e65ef91f
SHA1 6fa45d0ccda2ce7fc162233b0c0257e639063af7
SHA256 d6931a9e1eb6a57a465d796c4ae0f328d94e1e271c5ae458228d13b3e2b6d094
SHA512 5df1c165e36a5c4bd36c1eb3474558ccf8f490aa8157427ad208a95422cce83a8c969d49263e900e055fdddf79ae1c0d6b16996ec4e1c55a3dd6d996a19c7d65

memory/4724-137-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/4188-138-0x0000000071010000-0x000000007105C000-memory.dmp

memory/4188-139-0x0000000071220000-0x0000000071577000-memory.dmp

memory/5000-152-0x00000000062C0000-0x0000000006617000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9fd544a4bb167182c5a7965e69bc33cf
SHA1 b3e92e952af4add964ebb513999369f86c42d0f0
SHA256 19db79f5519114b5290bcf18880a3fabeb10e96cf4fa29523a573d42c6d3c50d
SHA512 43dd4834a81cd295b88b148da60390518a2c88264fce8d26a813c92d0a2298f4586a46e1cc4860eb2b618781105c13b970f1d93f781799bcd88bb6cab66068f3

memory/5000-159-0x0000000006DB0000-0x0000000006DFC000-memory.dmp

memory/5000-160-0x0000000070F30000-0x0000000070F7C000-memory.dmp

memory/5000-161-0x0000000071180000-0x00000000714D7000-memory.dmp

memory/5000-170-0x0000000007AB0000-0x0000000007B54000-memory.dmp

memory/5000-171-0x0000000007E20000-0x0000000007E31000-memory.dmp

memory/5000-172-0x0000000006660000-0x0000000006675000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 52e128262232fc49c6eb9e8d531ef3d7
SHA1 825a20907094fd0298e62ffb8e224f7b2e8863d6
SHA256 4ed9f27f35ee69ce8d7ba4d4331df69f2a989c189655393fb7ddb40a8946228b
SHA512 0289ee2b20855728da5832c5e6978f12fd51eebf338aedf70a7a9ff946d5dece5614c2bdbb6bd0e3d3a60e428b9de3dae5e49323045e3ec5f7a01b8293dd92a5

memory/3688-183-0x0000000070F30000-0x0000000070F7C000-memory.dmp

memory/3688-184-0x0000000071180000-0x00000000714D7000-memory.dmp

memory/2028-196-0x0000000000400000-0x0000000000D1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4724-202-0x0000000002A30000-0x0000000002E36000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/1928-207-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/864-211-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2028-212-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/1928-214-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/864-217-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2028-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-225-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/864-226-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2028-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-249-0x0000000000400000-0x0000000000D1C000-memory.dmp

memory/2028-253-0x0000000000400000-0x0000000000D1C000-memory.dmp