Malware Analysis Report

2025-08-10 17:22

Sample ID 240417-x3pa8sbf54
Target 22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
SHA256 22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e

Threat Level: Known bad

The file 22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba

Glupteba payload

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 19:22

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 19:22

Reported

2024-04-17 19:25

Platform

win11-20240412-en

Max time kernel

1s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 0abcf509-7a1e-42fd-9b05-bda13a9b0af0.uuid.theupdatetime.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server4.theupdatetime.org udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun.l.google.com udp
BG 185.82.216.108:443 server4.theupdatetime.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.108:443 server4.theupdatetime.org tcp
BG 185.82.216.108:443 server4.theupdatetime.org tcp

Files

memory/5092-1-0x0000000004FB0000-0x00000000053A9000-memory.dmp

memory/5092-2-0x00000000053B0000-0x0000000005C9B000-memory.dmp

memory/5092-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1280-4-0x00000000032A0000-0x00000000032D6000-memory.dmp

memory/1280-7-0x00000000054B0000-0x00000000054C0000-memory.dmp

memory/1280-8-0x00000000054B0000-0x00000000054C0000-memory.dmp

memory/1280-6-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/1280-9-0x0000000005880000-0x00000000058A2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0l4rttat.1ed.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1280-11-0x0000000006120000-0x0000000006186000-memory.dmp

memory/1280-20-0x0000000006380000-0x00000000066D7000-memory.dmp

memory/1280-10-0x0000000005A40000-0x0000000005AA6000-memory.dmp

memory/1280-5-0x0000000005AF0000-0x000000000611A000-memory.dmp

memory/1280-21-0x0000000006750000-0x000000000676E000-memory.dmp

memory/1280-22-0x0000000006780000-0x00000000067CC000-memory.dmp

memory/1280-23-0x00000000078D0000-0x0000000007916000-memory.dmp

memory/1280-24-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

memory/1280-37-0x00000000054B0000-0x00000000054C0000-memory.dmp

memory/1280-38-0x0000000007C60000-0x0000000007D04000-memory.dmp

memory/1280-36-0x0000000007C40000-0x0000000007C5E000-memory.dmp

memory/1280-27-0x0000000070A70000-0x0000000070DC7000-memory.dmp

memory/1280-40-0x0000000007D90000-0x0000000007DAA000-memory.dmp

memory/1280-41-0x0000000007DD0000-0x0000000007DDA000-memory.dmp

memory/1280-39-0x00000000083D0000-0x0000000008A4A000-memory.dmp

memory/1280-42-0x0000000007EE0000-0x0000000007F76000-memory.dmp

memory/1280-43-0x0000000007DF0000-0x0000000007E01000-memory.dmp

memory/1280-26-0x00000000708F0000-0x000000007093C000-memory.dmp

memory/1280-25-0x0000000007C00000-0x0000000007C34000-memory.dmp

memory/1280-44-0x0000000007E40000-0x0000000007E4E000-memory.dmp

memory/1280-45-0x0000000007E50000-0x0000000007E65000-memory.dmp

memory/1280-46-0x0000000007EA0000-0x0000000007EBA000-memory.dmp

memory/1280-47-0x0000000007EC0000-0x0000000007EC8000-memory.dmp

memory/1280-50-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/2824-52-0x0000000004E20000-0x0000000005222000-memory.dmp

memory/5092-53-0x0000000004FB0000-0x00000000053A9000-memory.dmp

memory/4856-54-0x0000000006380000-0x00000000066D7000-memory.dmp

memory/2824-63-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4856-64-0x0000000003020000-0x0000000003030000-memory.dmp

memory/4856-65-0x0000000003020000-0x0000000003030000-memory.dmp

memory/4856-67-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/5092-66-0x00000000053B0000-0x0000000005C9B000-memory.dmp

memory/4856-70-0x0000000070B20000-0x0000000070E77000-memory.dmp

memory/4856-79-0x0000000007AE0000-0x0000000007B84000-memory.dmp

memory/4856-69-0x00000000708F0000-0x000000007093C000-memory.dmp

memory/4856-68-0x000000007F9E0000-0x000000007F9F0000-memory.dmp

memory/5092-80-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4856-82-0x0000000003020000-0x0000000003030000-memory.dmp

memory/4856-83-0x0000000007E10000-0x0000000007E21000-memory.dmp

memory/4856-81-0x0000000003020000-0x0000000003030000-memory.dmp

memory/4856-84-0x0000000007E60000-0x0000000007E75000-memory.dmp

memory/4856-87-0x0000000074680000-0x0000000074E31000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/3308-91-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/3308-90-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3759a090b1c00cc8e774a61bca6ae324
SHA1 f1b2305915f2789be30d52bacb57b50269a08cbb
SHA256 a6a52b912dfd58dc3545dbefd5e59885f71b7fdfaf59b185f3ed6fc9c7c6bbe9
SHA512 95bd4d52aec73eee8ff1c089981591a026d8567809bf65d2328563e83f78669c97af0eaacba30811c6778d87f152cda1d1393cab406ad01d83cf748a48cf6dc2

memory/3308-100-0x0000000005A70000-0x0000000005DC7000-memory.dmp

memory/3308-89-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/3308-104-0x0000000071230000-0x0000000071587000-memory.dmp

memory/3308-114-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/3308-115-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/2824-113-0x0000000004E20000-0x0000000005222000-memory.dmp

memory/3308-103-0x00000000708F0000-0x000000007093C000-memory.dmp

memory/3308-102-0x000000007F860000-0x000000007F870000-memory.dmp

memory/4608-118-0x0000000074680000-0x0000000074E31000-memory.dmp

memory/4608-120-0x0000000006150000-0x00000000064A7000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 68a7f012ae1ada127fde2fd612db62a6
SHA1 6e82dd97901722163c36c9b4c98fd07c48edb3a2
SHA256 a30d63ad9b46b865151421d301dfdb1237f54e405fe225ba2e06aeffc1a7b1c3
SHA512 9e496241681ba116f07a4ec4f31f029505f1de5923a7cec7c2f42e640e5a7bda626ce70d28757930d493156d84b3951876d1b522b7230b2014234541e595f894

memory/4608-119-0x0000000003180000-0x0000000003190000-memory.dmp

memory/3308-117-0x0000000074680000-0x0000000074E31000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 67d886157a87e93a405de7cf500ce316
SHA1 8fd1b436a88875999bcffa4c9ab31de091a5e560
SHA256 22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
SHA512 6c48bc8ea4e694c23d0f396adeeb4f5ca5b84ef9b467747431a09dd1e0ff35eab39dda5adc94f4f1cd3cf115218d02ffb652b0daf540c88b1d714cfa1270c7a6

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1665a90344d84dfda86eee803d55f0c5
SHA1 a27d3b91d6c8a3f86cac7a9b6c49774b1bb24543
SHA256 49d8c57ca174eae727d9eaa0f1b415060b397be5c7a34fd29723428d30edf1e7
SHA512 dc40134962f8a9d2beec0deefb2670a5a28fad8c119a98bef0684fa03536460739a4cff90a844e00bb9a5c25fc5a58a1f821b98baf117857e5d909a82068b81d

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 4be5b2bc3f050048a65ace5a55da6646
SHA1 61d837bcb2e9cf3408b8feb30497b7f2430b3723
SHA256 c5c71d5e977aec68e85d3005025422da58a6c370a476b010b8d01798db86694d
SHA512 54cc8dc84dfe0ad86fa04350b3a6620d48e261cdd62723868db207fda1a3aa26d7d71a60254a0df877e5abf3678befbef7109b9605db742ee33f953cfbd0feec

memory/2824-208-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8970a3f8fb7a1903201bc95389b36c76
SHA1 5fa629c6160df3b6810d059ee8f857c5d5425f20
SHA256 a2235c0d25618631f3c9e99ff71149392ca5089aa65917e02683f50e6409d933
SHA512 8b0a35d6fbf9c0389ae98f133356d5bbce87e6232572f6276fd15fd2324eb509016f0a2cd13abf73dcacb85b23865c5aad8a89a38c6481bd04184053a0458453

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2516-244-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3500-253-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2516-255-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2816-257-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2516-259-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-263-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2816-265-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2516-267-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-271-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-275-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2816-277-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2516-279-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-283-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-287-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-291-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-295-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2516-299-0x0000000000400000-0x000000000310E000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 19:22

Reported

2024-04-17 19:25

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe

"C:\Users\Admin\AppData\Local\Temp\22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 60.166.213.23.in-addr.arpa udp
US 8.8.8.8:53 699625ad-588b-4568-8c13-a92a4f6c91e5.uuid.theupdatetime.org udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 server1.theupdatetime.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
NL 74.125.128.127:19302 stun2.l.google.com udp
BG 185.82.216.108:443 server1.theupdatetime.org tcp
US 8.8.8.8:53 127.128.125.74.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 udp
BG 185.82.216.108:443 server1.theupdatetime.org tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
BG 185.82.216.108:443 server1.theupdatetime.org tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 73.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

memory/736-1-0x0000000004E70000-0x0000000005278000-memory.dmp

memory/736-2-0x0000000005280000-0x0000000005B6B000-memory.dmp

memory/736-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1096-4-0x0000000005170000-0x00000000051A6000-memory.dmp

memory/1096-7-0x0000000005820000-0x0000000005E48000-memory.dmp

memory/1096-8-0x00000000051E0000-0x00000000051F0000-memory.dmp

memory/1096-6-0x00000000051E0000-0x00000000051F0000-memory.dmp

memory/1096-5-0x0000000074A70000-0x0000000075220000-memory.dmp

memory/1096-10-0x0000000005F50000-0x0000000005FB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t5ttdrv0.yg4.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1096-11-0x00000000060F0000-0x0000000006156000-memory.dmp

memory/1096-21-0x0000000006260000-0x00000000065B4000-memory.dmp

memory/1096-9-0x0000000005780000-0x00000000057A2000-memory.dmp

memory/1096-23-0x00000000067A0000-0x00000000067EC000-memory.dmp

memory/1096-22-0x0000000006750000-0x000000000676E000-memory.dmp

memory/1096-24-0x0000000006CA0000-0x0000000006CE4000-memory.dmp

memory/1096-25-0x0000000007A80000-0x0000000007AF6000-memory.dmp

memory/1096-27-0x0000000007B20000-0x0000000007B3A000-memory.dmp

memory/1096-26-0x0000000008180000-0x00000000087FA000-memory.dmp

memory/1096-29-0x0000000007CD0000-0x0000000007D02000-memory.dmp

memory/1096-43-0x00000000051E0000-0x00000000051F0000-memory.dmp

memory/1096-44-0x0000000007E20000-0x0000000007E2A000-memory.dmp

memory/1096-45-0x0000000007F30000-0x0000000007FC6000-memory.dmp

memory/1096-46-0x0000000007E30000-0x0000000007E41000-memory.dmp

memory/1096-42-0x0000000007D30000-0x0000000007DD3000-memory.dmp

memory/1096-41-0x0000000007D10000-0x0000000007D2E000-memory.dmp

memory/1096-31-0x0000000070A90000-0x0000000070DE4000-memory.dmp

memory/1096-30-0x0000000070910000-0x000000007095C000-memory.dmp

memory/1096-28-0x000000007F100000-0x000000007F110000-memory.dmp

memory/1096-47-0x0000000007E70000-0x0000000007E7E000-memory.dmp

memory/1096-48-0x0000000007E90000-0x0000000007EA4000-memory.dmp

memory/1096-50-0x0000000007ED0000-0x0000000007ED8000-memory.dmp

memory/1096-49-0x0000000007EE0000-0x0000000007EFA000-memory.dmp

memory/1096-53-0x0000000074A70000-0x0000000075220000-memory.dmp

memory/4328-55-0x0000000004D90000-0x0000000005192000-memory.dmp

memory/4328-56-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2160-67-0x00000000047A0000-0x00000000047B0000-memory.dmp

memory/2160-68-0x00000000047A0000-0x00000000047B0000-memory.dmp

memory/2160-66-0x0000000005510000-0x0000000005864000-memory.dmp

memory/4328-69-0x00000000051A0000-0x0000000005A8B000-memory.dmp

memory/2160-70-0x0000000074A70000-0x0000000075220000-memory.dmp

memory/2160-71-0x000000007FB20000-0x000000007FB30000-memory.dmp

memory/736-84-0x0000000004E70000-0x0000000005278000-memory.dmp

memory/2160-83-0x0000000006D90000-0x0000000006E33000-memory.dmp

memory/2160-86-0x00000000047A0000-0x00000000047B0000-memory.dmp

memory/2160-85-0x00000000047A0000-0x00000000047B0000-memory.dmp

memory/2160-73-0x0000000071090000-0x00000000713E4000-memory.dmp

memory/2160-72-0x0000000070910000-0x000000007095C000-memory.dmp

memory/2160-87-0x00000000070B0000-0x00000000070C1000-memory.dmp

memory/2160-88-0x0000000007100000-0x0000000007114000-memory.dmp

memory/2160-91-0x0000000074A70000-0x0000000075220000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 3d086a433708053f9bf9523e1d87a4e8
SHA1 b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA256 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

memory/4536-94-0x00000000045D0000-0x00000000045E0000-memory.dmp

memory/4536-96-0x00000000054A0000-0x00000000057F4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7588d6273270c2cbfb92927c33e79d0b
SHA1 39b9dc8e282ae22936b069cb64b82c168261c31f
SHA256 ebde69d7ceb6652be3c5f2ccc07e8f3d147d177c28c78f8aed6d6036febaeb6c
SHA512 d3162b31c6460eb83c735accb78000aead5a877a6b1853153d7afbe262fb64d59f654c91e4244627eb08ff516e1d7e5233359f517dda124daf3551f4d8d6f143

memory/4536-95-0x00000000045D0000-0x00000000045E0000-memory.dmp

memory/4536-93-0x0000000074A70000-0x0000000075220000-memory.dmp

memory/4536-108-0x00000000716C0000-0x0000000071A14000-memory.dmp

memory/4536-107-0x0000000070910000-0x000000007095C000-memory.dmp

memory/4536-119-0x000000007FB40000-0x000000007FB50000-memory.dmp

memory/4536-120-0x00000000045D0000-0x00000000045E0000-memory.dmp

memory/736-118-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3776-124-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

memory/3776-125-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

memory/3776-123-0x0000000074A70000-0x0000000075220000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 dfbe343509e98d6fe221a681270b7397
SHA1 41c383fc67fad5b8e1a2b828137c8e8b04329056
SHA256 6b592f761bb80e568b0898c9cecb2d06097913aa78727cb5bcfcf755f024772c
SHA512 dd09ce5944fd46186c44df76e32a066e3ff4bb411c6bd901dfb8f489b50bb0be0cd231b57cf7b9d6e7a4ed9a6b36e30194e83139b6b72b42394125a5bb7e9c5c

memory/4536-122-0x0000000074A70000-0x0000000075220000-memory.dmp

memory/4328-136-0x0000000004D90000-0x0000000005192000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 67d886157a87e93a405de7cf500ce316
SHA1 8fd1b436a88875999bcffa4c9ab31de091a5e560
SHA256 22835c297e7ed075ffcbb42c6fb6c7aea0b21e8f655e08210fab8ccde20ab18e
SHA512 6c48bc8ea4e694c23d0f396adeeb4f5ca5b84ef9b467747431a09dd1e0ff35eab39dda5adc94f4f1cd3cf115218d02ffb652b0daf540c88b1d714cfa1270c7a6

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 82a610125f5c28ad29f2659835249255
SHA1 8402077193bb905213174c10ceeeafd4944cf1eb
SHA256 133bf4c54bdb241c071a67e3e2914dafb7c740c9c037cbaeededab2375d523bd
SHA512 35ddd5b8e228fd663306a20bf1a95b328a1fd80e4f294335a1bb8a46c6a26b155e212af0802587d25f9725e8f2956a7928211eb8ebb7662600bfd5d905c81fdb

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 eb0deafe946d1425cbade6d866bc228f
SHA1 a3a7f8b3f1e185155d8e5fd3111a4c692b08ae76
SHA256 4d081f85717f206864e9bf5f8be19bfaf17c597de1f6e738dd92cf9ef671c65f
SHA512 09f6b7ec7c59a8a96d0461a598545033f75e24d1b23aec1b087e793665f53502df13c639fbab6185f392c15d46917a8ffd0ad1b712d656a7c3329fd5c4981bee

memory/4328-218-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cedf548d336c6800f83ec8da942187fd
SHA1 85c619fadcf662d67a7b94313946ebb9b155f1fa
SHA256 43d136613003992dbb410dcd777b208a08bdd37386e453a77efdaec75b26370d
SHA512 747943e7820c7631e351cc61cc54ef3545bdd32a3c72cce9df5b911838d7aad71b20cd375139b42f4b2ac07853b69809bfcedc6a5e53dba34b5e74db95426906

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/3460-255-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/556-263-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3460-266-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4688-268-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3460-270-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-274-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4688-276-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/3460-278-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-282-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-285-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-290-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-294-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-298-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-302-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-306-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3460-310-0x0000000000400000-0x000000000310E000-memory.dmp