Malware Analysis Report

2025-08-10 17:22

Sample ID 240417-x22vyabf27
Target 991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
SHA256 991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93

Threat Level: Known bad

The file 991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93 was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba payload

Glupteba

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 19:21

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 19:21

Reported

2024-04-17 19:24

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 67.32.209.4.in-addr.arpa udp
US 8.8.8.8:53 60.166.213.23.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 3a014c97-0fb7-449e-b4e5-3e1933498661.uuid.createupdate.org udp
US 8.8.8.8:53 stun3.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server14.createupdate.org udp
BG 185.82.216.104:443 server14.createupdate.org tcp
US 162.159.133.233:443 cdn.discordapp.com tcp
IT 142.251.27.127:19302 stun3.l.google.com udp
US 8.8.8.8:53 carsalessystem.com udp
US 172.67.221.71:443 carsalessystem.com tcp
US 13.85.23.206:443 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
BG 185.82.216.104:443 server14.createupdate.org tcp
US 8.8.8.8:53 205.201.50.20.in-addr.arpa udp

Files

memory/1760-1-0x0000000004E50000-0x0000000005258000-memory.dmp

memory/1760-2-0x0000000005260000-0x0000000005B4B000-memory.dmp

memory/1760-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/384-4-0x0000000002D70000-0x0000000002DA6000-memory.dmp

memory/384-5-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/384-6-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/384-7-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/384-8-0x0000000005450000-0x0000000005A78000-memory.dmp

memory/384-9-0x0000000005AB0000-0x0000000005AD2000-memory.dmp

memory/384-11-0x0000000005BC0000-0x0000000005C26000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_adnrp2ia.haw.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/384-10-0x0000000005B50000-0x0000000005BB6000-memory.dmp

memory/384-21-0x0000000005CF0000-0x0000000006044000-memory.dmp

memory/384-22-0x0000000006350000-0x000000000636E000-memory.dmp

memory/384-23-0x0000000006380000-0x00000000063CC000-memory.dmp

memory/384-24-0x0000000006880000-0x00000000068C4000-memory.dmp

memory/384-25-0x0000000007660000-0x00000000076D6000-memory.dmp

memory/384-27-0x0000000007700000-0x000000000771A000-memory.dmp

memory/384-26-0x0000000007D60000-0x00000000083DA000-memory.dmp

memory/384-29-0x00000000078C0000-0x00000000078F2000-memory.dmp

memory/384-28-0x000000007F510000-0x000000007F520000-memory.dmp

memory/384-31-0x0000000070A00000-0x0000000070D54000-memory.dmp

memory/384-43-0x0000000007920000-0x00000000079C3000-memory.dmp

memory/384-44-0x0000000007A10000-0x0000000007A1A000-memory.dmp

memory/384-42-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/384-41-0x0000000007900000-0x000000000791E000-memory.dmp

memory/384-45-0x0000000007B20000-0x0000000007BB6000-memory.dmp

memory/384-30-0x00000000705E0000-0x000000007062C000-memory.dmp

memory/384-46-0x0000000007A20000-0x0000000007A31000-memory.dmp

memory/384-47-0x0000000007A60000-0x0000000007A6E000-memory.dmp

memory/384-48-0x0000000007A80000-0x0000000007A94000-memory.dmp

memory/384-50-0x0000000007AB0000-0x0000000007AB8000-memory.dmp

memory/384-49-0x0000000007AC0000-0x0000000007ADA000-memory.dmp

memory/384-53-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/3836-55-0x0000000004DE0000-0x00000000051E1000-memory.dmp

memory/1760-56-0x0000000004E50000-0x0000000005258000-memory.dmp

memory/3836-57-0x00000000051F0000-0x0000000005ADB000-memory.dmp

memory/3836-58-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4332-68-0x00000000057F0000-0x0000000005B44000-memory.dmp

memory/4332-69-0x00000000048C0000-0x00000000048D0000-memory.dmp

memory/4332-70-0x00000000048C0000-0x00000000048D0000-memory.dmp

memory/4332-71-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/4332-72-0x00000000705E0000-0x000000007062C000-memory.dmp

memory/4332-73-0x0000000070780000-0x0000000070AD4000-memory.dmp

memory/4332-83-0x0000000006EF0000-0x0000000006F93000-memory.dmp

memory/1760-84-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4332-87-0x00000000048C0000-0x00000000048D0000-memory.dmp

memory/4332-86-0x00000000048C0000-0x00000000048D0000-memory.dmp

memory/4332-85-0x000000007F570000-0x000000007F580000-memory.dmp

memory/4332-88-0x0000000007210000-0x0000000007221000-memory.dmp

memory/4332-89-0x0000000007260000-0x0000000007274000-memory.dmp

memory/4332-92-0x0000000074740000-0x0000000074EF0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/1276-104-0x0000000074740000-0x0000000074EF0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e646652ba359f162dd042855ed76fe8d
SHA1 a9039a368cebf5ee9de7882dc0ea517e462f73d5
SHA256 459124482e8ae9c3414b093a06baf09bbb5edf6b4bca3d8725409897faabf4b1
SHA512 2964d6441cd4f9d532ff0e124dda2d47f0b6ced62e94f72e81c6954a86fe0f4a6fe2e79e70632ec658c5fe31ecad9371cf410a6a25fbb4d18809e8d910d38df6

memory/1276-107-0x00000000033F0000-0x0000000003400000-memory.dmp

memory/1276-106-0x00000000033F0000-0x0000000003400000-memory.dmp

memory/1276-105-0x0000000006470000-0x00000000067C4000-memory.dmp

memory/1276-110-0x0000000070760000-0x0000000070AB4000-memory.dmp

memory/3836-120-0x0000000004DE0000-0x00000000051E1000-memory.dmp

memory/1276-122-0x00000000033F0000-0x0000000003400000-memory.dmp

memory/1276-121-0x00000000033F0000-0x0000000003400000-memory.dmp

memory/1276-109-0x00000000705E0000-0x000000007062C000-memory.dmp

memory/1276-124-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/4480-126-0x00000000050D0000-0x00000000050E0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 24a14f082bed86d19f290200860f1774
SHA1 013aa751622c48410a9a1fa622422aa19a35d176
SHA256 39eb55afab67c2a8f8d800a4918f6eb774dc6c67c7d3b6f28346dfa6769bb32f
SHA512 044310332a9040bb193f0711d8f75018aeb05043550218d72d7cd33b2c2ed64b9147e9a2c52b5661aa97dc2b321bf93f22d091e55ced3e404fd733fd0ed74037

memory/4480-132-0x0000000005FA0000-0x00000000062F4000-memory.dmp

memory/4480-125-0x0000000074740000-0x0000000074EF0000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 aaa02ee040bc3d36c56f6616c539a52f
SHA1 5337e399cb1d60509925a19f528f20b787fedfee
SHA256 991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
SHA512 757fdd24a055f9df7d96bd9cd0b66b6dace91b45ca583d6571a2990b049f4438c1c65ad354d852abd9e27b32c112b8c4938fe7e013356dc8a7cfd14af476e1a7

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 109dc9147f9a900fac3cc800e830c86c
SHA1 fc5ddcfc59a0fcd0e35e0c3563ce43878268c76d
SHA256 03417618f9cce3543aac9fcbe6034efc3a87f11b6fe785ea80296d94e63e62cc
SHA512 557efcb3bc269d9a7138c2c0323ddebd2144d1bad5637804e899971e568321aad605227e1b7eff3c23983befe3e86d3acf9c3c048abe9762af9d261cb05074ba

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ce493cd9660c17ae4c1e8ecd2f7a0641
SHA1 65632a93b530c1ab2c7c6488a1b8f6b0df0e62bc
SHA256 7d690e910ee5ab20e2a8690b7b774a09b42c04a53a051fea1bf4da5ac49ef92f
SHA512 a7f28312e430784475e4c1b15347ebcfb6ed26efa8028c55ce9759e5fd08654bb83e166bf442dfb63f1402986f7db81af4dd62af178184508cb42346909162dd

memory/3836-203-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 d0d66fc2d2e387f0adbef04891056882
SHA1 1fed0e2fe4cec1dfe5b20b9e3420baabf0e5ccda
SHA256 0c2125f90c9aa04d0460940477c412e77f2bddf67ecef3d4bf6761668e4378da
SHA512 e8906325255083db2fbc46b8c855f6a567a2da8b0c9e5553eb9cb0eca03a9dea80896303464cd57724fcd65caf59026941ded17d4194d0f6f0c0b0cb48daa11a

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2568-258-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/1100-266-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2568-269-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3728-271-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2568-273-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-277-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3728-280-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2568-281-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-285-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-289-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-293-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-297-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-301-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-305-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-309-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2568-313-0x0000000000400000-0x000000000310E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 19:21

Reported

2024-04-17 19:24

Platform

win11-20240412-en

Max time kernel

1s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe

"C:\Users\Admin\AppData\Local\Temp\991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 edaa9796-f113-4599-98b2-1ce2f1ccbfd3.uuid.createupdate.org udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server9.createupdate.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.104:443 server9.createupdate.org tcp
BG 185.82.216.104:443 server9.createupdate.org tcp

Files

memory/2940-1-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/2940-2-0x0000000005220000-0x0000000005B0B000-memory.dmp

memory/2940-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3096-4-0x0000000005270000-0x00000000052A6000-memory.dmp

memory/3096-7-0x0000000005300000-0x0000000005310000-memory.dmp

memory/3096-8-0x0000000005300000-0x0000000005310000-memory.dmp

memory/3096-6-0x0000000005940000-0x0000000005F6A000-memory.dmp

memory/3096-5-0x00000000744C0000-0x0000000074C71000-memory.dmp

memory/3096-9-0x0000000005840000-0x0000000005862000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b1aywhj5.52u.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3096-11-0x0000000005FE0000-0x0000000006046000-memory.dmp

memory/3096-20-0x00000000062E0000-0x0000000006637000-memory.dmp

memory/3096-10-0x0000000005F70000-0x0000000005FD6000-memory.dmp

memory/3096-21-0x00000000066F0000-0x000000000670E000-memory.dmp

memory/3096-22-0x0000000006740000-0x000000000678C000-memory.dmp

memory/3096-23-0x0000000006CA0000-0x0000000006CE6000-memory.dmp

memory/3096-24-0x000000007F630000-0x000000007F640000-memory.dmp

memory/3096-36-0x0000000007B70000-0x0000000007B8E000-memory.dmp

memory/3096-38-0x0000000005300000-0x0000000005310000-memory.dmp

memory/3096-37-0x0000000007B90000-0x0000000007C34000-memory.dmp

memory/3096-27-0x00000000708B0000-0x0000000070C07000-memory.dmp

memory/3096-40-0x0000000007CC0000-0x0000000007CDA000-memory.dmp

memory/3096-39-0x0000000008300000-0x000000000897A000-memory.dmp

memory/3096-41-0x0000000007D00000-0x0000000007D0A000-memory.dmp

memory/3096-26-0x0000000070730000-0x000000007077C000-memory.dmp

memory/3096-25-0x0000000007B30000-0x0000000007B64000-memory.dmp

memory/3096-42-0x0000000007E10000-0x0000000007EA6000-memory.dmp

memory/3096-43-0x0000000007D20000-0x0000000007D31000-memory.dmp

memory/3096-44-0x0000000007D70000-0x0000000007D7E000-memory.dmp

memory/3096-45-0x0000000007D80000-0x0000000007D95000-memory.dmp

memory/3096-46-0x0000000007DD0000-0x0000000007DEA000-memory.dmp

memory/3096-47-0x0000000007DF0000-0x0000000007DF8000-memory.dmp

memory/3096-50-0x00000000744C0000-0x0000000074C71000-memory.dmp

memory/712-52-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/712-53-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2880-54-0x0000000006270000-0x00000000065C7000-memory.dmp

memory/2940-65-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/2880-64-0x00000000053C0000-0x00000000053D0000-memory.dmp

memory/712-66-0x0000000005220000-0x0000000005B0B000-memory.dmp

memory/2880-63-0x00000000053C0000-0x00000000053D0000-memory.dmp

memory/2880-67-0x00000000744C0000-0x0000000074C71000-memory.dmp

memory/2880-68-0x0000000070730000-0x000000007077C000-memory.dmp

memory/2880-69-0x0000000070980000-0x0000000070CD7000-memory.dmp

memory/2880-79-0x00000000053C0000-0x00000000053D0000-memory.dmp

memory/2880-78-0x0000000007940000-0x00000000079E4000-memory.dmp

memory/2880-80-0x0000000007C90000-0x0000000007CA1000-memory.dmp

memory/2880-81-0x0000000007CE0000-0x0000000007CF5000-memory.dmp

memory/2880-84-0x00000000744C0000-0x0000000074C71000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/2940-86-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 79140fdc434fd0e0ae83c2788dad4aea
SHA1 e9a22e9b5268f3b0257e644e26eb344bfa2a7419
SHA256 7564d7e2b8980bb200e31b4224862f963847e58995e4c309d1d9265a07f4b963
SHA512 2d16e1cd93473d106bf36340b5d66b153864e9f1b190fd7dd6e5e06f41fc7a9a2b1874b9924d1b4a0ef73d42f56652a68c422eadb458eb35584b5aa3a2b50d1b

memory/2496-96-0x00000000744C0000-0x0000000074C71000-memory.dmp

memory/2496-98-0x0000000004840000-0x0000000004850000-memory.dmp

memory/2496-97-0x0000000004840000-0x0000000004850000-memory.dmp

memory/2496-100-0x00000000708B0000-0x0000000070C07000-memory.dmp

memory/2496-99-0x0000000070730000-0x000000007077C000-memory.dmp

memory/3688-112-0x00000000024E0000-0x00000000024F0000-memory.dmp

memory/3688-111-0x00000000744C0000-0x0000000074C71000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 74472a693fd55eb84aff5ccdbc45741d
SHA1 dffc9e769f81d3864b363cd5b71bb16734abe6b0
SHA256 03a95cccdc4f934b14880d7237322163f6e22d8289aa0cac8e49fd91e2e97e3a
SHA512 62c915c9d936612288df1930cec9d4ff43757939a747126cb88d814fefe036f869b180f17ea74f7580e554550663710b2772c034632383e24414daf9ecbc1711

memory/2496-110-0x00000000744C0000-0x0000000074C71000-memory.dmp

memory/3688-124-0x0000000070980000-0x0000000070CD7000-memory.dmp

memory/712-123-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/3688-122-0x0000000070730000-0x000000007077C000-memory.dmp

memory/712-133-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3688-135-0x00000000024E0000-0x00000000024F0000-memory.dmp

memory/3688-134-0x000000007F4E0000-0x000000007F4F0000-memory.dmp

memory/3688-137-0x00000000744C0000-0x0000000074C71000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 aaa02ee040bc3d36c56f6616c539a52f
SHA1 5337e399cb1d60509925a19f528f20b787fedfee
SHA256 991bbded1a14a90f8d3f0ad37272d93bb71a11cbb935a0301cc47d66c3729a93
SHA512 757fdd24a055f9df7d96bd9cd0b66b6dace91b45ca583d6571a2990b049f4438c1c65ad354d852abd9e27b32c112b8c4938fe7e013356dc8a7cfd14af476e1a7

memory/712-141-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-144-0x0000000005200000-0x0000000005600000-memory.dmp

memory/4728-153-0x0000000005E90000-0x00000000061E7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b8eb1e3a85f3927615e00c932c53cae4
SHA1 ef5ea44f3f23b62ec19f026dfb021140a4c74502
SHA256 5ba1357917665f9dfee6e34452917efac30d197359c42ba68064282a3ff2c16a
SHA512 59fa7379c167f77d6a5ae401f92607d9dc196356d632bc780d3908cebb816d00bb24870fbef17af92614b198415895d26a3c4e9dde033c39865490cefefc204b

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 52b56db84d5c6cf7b4c6610f6f6aed84
SHA1 4efbbab6b1208b054f571566b643867bc7bd6af2
SHA256 a44279302556dcdc9e1bb29a3d53bfb3b3bbb59d5c7977dc5c627c3df64059b3
SHA512 d1cba3bb00ed3ca8b40cc3c3ce9bfbd2575302fbecb66e1053342280d272536d34436dc8c1c9812b6f1d47bd66387eab4bf0369d7e5727b22269071f56a42a0e

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a02012f555d3acecf0f767eb476e5b25
SHA1 44ba4079c54bd7acfc7effd2d5e5a7d40508e32f
SHA256 3f2886379251a12715332a02f6f08a08d871d69a9c089bb18418a03159e423af
SHA512 a99ba3e5ae9910ae6e180677e4e4045be8c7cc3aa401d2d1da00e58274c32cf6ad95f99f16d85cb5e66712db7fc060d3a2d9bcbec90ddfa7d77ba4cd03bce16a

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4792-236-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/2312-245-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4792-246-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-248-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4800-249-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4792-251-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4800-255-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4792-254-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-257-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-260-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-264-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-267-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-270-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-272-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-275-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4792-278-0x0000000000400000-0x000000000310E000-memory.dmp