Malware Analysis Report

2025-08-10 17:23

Sample ID 240417-x4b3asbf83
Target dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
SHA256 dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729

Threat Level: Known bad

The file dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729 was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba

Glupteba payload

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 19:24

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 19:24

Reported

2024-04-17 19:26

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 156.33.209.4.in-addr.arpa udp
US 8.8.8.8:53 60.166.213.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 f356ad3c-5c01-44ac-a9dc-b09d0178a013.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 stun.ipfire.org udp
US 8.8.8.8:53 server5.databaseupgrade.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.108:443 server5.databaseupgrade.ru tcp
US 8.8.8.8:53 233.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
BG 185.82.216.108:443 server5.databaseupgrade.ru tcp
US 8.8.8.8:53 139.53.16.96.in-addr.arpa udp
US 8.8.8.8:53 36.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 81.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
BG 185.82.216.108:443 server5.databaseupgrade.ru tcp
US 8.8.8.8:53 77.239.69.13.in-addr.arpa udp

Files

memory/1840-1-0x0000000004E50000-0x0000000005257000-memory.dmp

memory/1840-2-0x0000000005260000-0x0000000005B4B000-memory.dmp

memory/1840-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/716-4-0x0000000003270000-0x00000000032A6000-memory.dmp

memory/716-6-0x0000000003320000-0x0000000003330000-memory.dmp

memory/716-5-0x0000000074190000-0x0000000074940000-memory.dmp

memory/716-7-0x0000000005A20000-0x0000000006048000-memory.dmp

memory/716-8-0x0000000005870000-0x0000000005892000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4ngkj0dv.eaa.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/716-15-0x0000000006150000-0x00000000061B6000-memory.dmp

memory/716-9-0x0000000005910000-0x0000000005976000-memory.dmp

memory/716-20-0x0000000006330000-0x0000000006684000-memory.dmp

memory/716-21-0x0000000006850000-0x000000000686E000-memory.dmp

memory/716-22-0x0000000006900000-0x000000000694C000-memory.dmp

memory/716-23-0x0000000006DB0000-0x0000000006DF4000-memory.dmp

memory/716-24-0x0000000007B70000-0x0000000007BE6000-memory.dmp

memory/716-25-0x0000000008270000-0x00000000088EA000-memory.dmp

memory/716-26-0x0000000007C10000-0x0000000007C2A000-memory.dmp

memory/716-27-0x0000000007DD0000-0x0000000007E02000-memory.dmp

memory/716-30-0x00000000701B0000-0x0000000070504000-memory.dmp

memory/716-41-0x0000000007E30000-0x0000000007ED3000-memory.dmp

memory/716-43-0x0000000007F20000-0x0000000007F2A000-memory.dmp

memory/716-42-0x0000000003320000-0x0000000003330000-memory.dmp

memory/716-40-0x0000000007E10000-0x0000000007E2E000-memory.dmp

memory/716-29-0x0000000070030000-0x000000007007C000-memory.dmp

memory/716-45-0x0000000008030000-0x00000000080C6000-memory.dmp

memory/716-44-0x0000000003320000-0x0000000003330000-memory.dmp

memory/716-46-0x0000000007F30000-0x0000000007F41000-memory.dmp

memory/716-28-0x000000007F940000-0x000000007F950000-memory.dmp

memory/716-49-0x0000000007FE0000-0x0000000007FFA000-memory.dmp

memory/716-50-0x0000000007FD0000-0x0000000007FD8000-memory.dmp

memory/716-48-0x0000000007F90000-0x0000000007FA4000-memory.dmp

memory/716-47-0x0000000007F70000-0x0000000007F7E000-memory.dmp

memory/716-53-0x0000000074190000-0x0000000074940000-memory.dmp

memory/4196-55-0x0000000004D20000-0x0000000005124000-memory.dmp

memory/4196-56-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3260-58-0x0000000005330000-0x0000000005340000-memory.dmp

memory/3260-57-0x0000000006260000-0x00000000065B4000-memory.dmp

memory/3260-59-0x0000000005330000-0x0000000005340000-memory.dmp

memory/1840-69-0x0000000004E50000-0x0000000005257000-memory.dmp

memory/4196-70-0x0000000005130000-0x0000000005A1B000-memory.dmp

memory/3260-71-0x0000000074190000-0x0000000074940000-memory.dmp

memory/3260-72-0x0000000070030000-0x000000007007C000-memory.dmp

memory/3260-73-0x000000007FD50000-0x000000007FD60000-memory.dmp

memory/3260-84-0x0000000007B40000-0x0000000007BE3000-memory.dmp

memory/3260-74-0x00000000707B0000-0x0000000070B04000-memory.dmp

memory/3260-85-0x0000000007E70000-0x0000000007E81000-memory.dmp

memory/3260-86-0x0000000007EC0000-0x0000000007ED4000-memory.dmp

memory/3260-89-0x0000000074190000-0x0000000074940000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/4720-91-0x0000000005EF0000-0x0000000006244000-memory.dmp

memory/1840-102-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 24b22517b96c49b0083861717dfcdd07
SHA1 09d2b2b3785dbe68bd03be11fc617547fdd6ac43
SHA256 02fc2e3e6d0fe4d920028ad9bbde703d80b2d30f3a5fc5e67034d536086c6ded
SHA512 608627f5a3f6978fd4f8a130cec7b42e51eaf335df0b295156b3b587e46e0900e63cfa0373155ecbe35bfc1acada654ed149b7fdb4234bddd5ffbff504ffca6d

memory/4720-103-0x0000000074190000-0x0000000074940000-memory.dmp

memory/4720-105-0x00000000050A0000-0x00000000050B0000-memory.dmp

memory/4720-104-0x00000000050A0000-0x00000000050B0000-memory.dmp

memory/4720-107-0x0000000070DE0000-0x0000000071134000-memory.dmp

memory/4720-117-0x00000000050A0000-0x00000000050B0000-memory.dmp

memory/4720-106-0x0000000070030000-0x000000007007C000-memory.dmp

memory/4720-119-0x0000000074190000-0x0000000074940000-memory.dmp

memory/2576-122-0x0000000004F00000-0x0000000004F10000-memory.dmp

memory/2576-121-0x0000000004F00000-0x0000000004F10000-memory.dmp

memory/2576-120-0x0000000074190000-0x0000000074940000-memory.dmp

memory/4196-123-0x0000000004D20000-0x0000000005124000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ee61f3b643bf54e8c6a5901781e245b1
SHA1 b20193427b61b349ae60edb35d0bc0a8ab278ce9
SHA256 b02307808b259377667e45984ac4f507995d679919aad115cb7d696c2f40d507
SHA512 9af7a45a5cd08a12eacf68c693ceda2cf81f265e9e9a6bcde562756a8947b47d013b0134b83928946a7df8448d81ba0cd7d6ced631afbc5d31c12faf75f0f1c3

memory/4196-134-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2576-136-0x0000000070030000-0x000000007007C000-memory.dmp

memory/2576-135-0x000000007F560000-0x000000007F570000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 aa64cf54033640aa3d03c340ef057bdf
SHA1 928c0735ff21c34d256819c79f78f3fc77111136
SHA256 dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
SHA512 a0ffd772763c3ff06f50e279e1b824e44873978d0308349ba5d2702841e163a5e18fa6cfb675e36e0a6c4c24e0435bc4c4cb8be38cd4e28533d8a0847099481a

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 b17d89d3409ce63edf7e60f82893ac13
SHA1 6b288f4269bd2310616e800a9b3c446bdc3b667f
SHA256 bac6b0cd83d574d12029b0e0eae80341eece72518886d2d216798c36caeeb002
SHA512 b42cabc7c31dfa9c99dbd3e0d42b536c9ba8abb2abf688ea89eca63e9843f5280a196bb5f0df9d1971e8fad1a280c21aef1aa32fabbfdaf4da67c4ee2c2c5ad4

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 4ef13e886b6ba0d34c3a1e02c3d0bd50
SHA1 e381c54a833c9222bc7d03e82a915f8b696754fa
SHA256 8791553a5cf4f0abfadbb83a6466314192bd160339b97bf824f3d7024a5ddac1
SHA512 4821b5e671223b0924366e4e361ccd747e53c5b1fcc02995e8948dfdc9168a2fd170e2b8e0986c0cc8c13a693834c18fc559c96d26a8838395f0919f2cce1b62

memory/4196-216-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8e58443c2677e6f212884c25d5587f6f
SHA1 3fbfc42066a315f6e4acc156af916c4bda87955d
SHA256 8d49d1b1a578aad8be8c52dd5aa0832215c4e0080c05fdccdae28c9d7e6e95dd
SHA512 afd7ff00d0e4d36e6e6ce2495f1834be254a2c214ac8f79a8a94303c3c87148fd66a56568b231b28bd883a9ecda029877859c2a016158d71e86d779c2c2a35cf

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2052-254-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4936-263-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2052-265-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1228-267-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2052-269-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-273-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1228-275-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2052-277-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-281-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-285-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1228-287-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2052-289-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-293-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-297-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-301-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-305-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2052-309-0x0000000000400000-0x000000000310E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 19:24

Reported

2024-04-17 19:26

Platform

win11-20240412-en

Max time kernel

2s

Max time network

159s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe

"C:\Users\Admin\AppData\Local\Temp\dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 211ab55a-c859-49e9-ab5b-09bdc3e27ec2.uuid.databaseupgrade.ru udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 server2.databaseupgrade.ru udp
NL 74.125.128.127:19302 stun2.l.google.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server2.databaseupgrade.ru tcp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.108:443 server2.databaseupgrade.ru tcp

Files

memory/3080-1-0x0000000004E90000-0x0000000005297000-memory.dmp

memory/3080-2-0x00000000052A0000-0x0000000005B8B000-memory.dmp

memory/3080-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/644-4-0x0000000004650000-0x0000000004686000-memory.dmp

memory/644-5-0x0000000074860000-0x0000000075011000-memory.dmp

memory/644-6-0x0000000004760000-0x0000000004770000-memory.dmp

memory/644-7-0x0000000004DA0000-0x00000000053CA000-memory.dmp

memory/644-8-0x0000000004C30000-0x0000000004C52000-memory.dmp

memory/644-9-0x0000000005440000-0x00000000054A6000-memory.dmp

memory/644-10-0x00000000054B0000-0x0000000005516000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sbht4t3i.14g.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/644-19-0x00000000055E0000-0x0000000005937000-memory.dmp

memory/644-20-0x0000000005B10000-0x0000000005B2E000-memory.dmp

memory/644-21-0x0000000005B40000-0x0000000005B8C000-memory.dmp

memory/644-22-0x00000000060C0000-0x0000000006106000-memory.dmp

memory/644-23-0x0000000004760000-0x0000000004770000-memory.dmp

memory/644-24-0x000000007F790000-0x000000007F7A0000-memory.dmp

memory/644-25-0x0000000006F40000-0x0000000006F74000-memory.dmp

memory/644-27-0x0000000070C70000-0x0000000070FC7000-memory.dmp

memory/644-37-0x0000000006F80000-0x0000000007024000-memory.dmp

memory/644-36-0x0000000006F20000-0x0000000006F3E000-memory.dmp

memory/644-26-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/644-39-0x00000000070B0000-0x00000000070CA000-memory.dmp

memory/644-38-0x00000000076F0000-0x0000000007D6A000-memory.dmp

memory/644-40-0x00000000070F0000-0x00000000070FA000-memory.dmp

memory/644-41-0x0000000007200000-0x0000000007296000-memory.dmp

memory/644-42-0x0000000007110000-0x0000000007121000-memory.dmp

memory/644-43-0x0000000007160000-0x000000000716E000-memory.dmp

memory/644-44-0x0000000007170000-0x0000000007185000-memory.dmp

memory/644-45-0x00000000071C0000-0x00000000071DA000-memory.dmp

memory/644-46-0x00000000071E0000-0x00000000071E8000-memory.dmp

memory/644-49-0x0000000074860000-0x0000000075011000-memory.dmp

memory/3080-51-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3080-52-0x0000000004E90000-0x0000000005297000-memory.dmp

memory/4108-54-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/3080-53-0x00000000052A0000-0x0000000005B8B000-memory.dmp

memory/2840-60-0x0000000005DA0000-0x00000000060F7000-memory.dmp

memory/4108-64-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2840-65-0x0000000005130000-0x0000000005140000-memory.dmp

memory/2840-66-0x0000000005130000-0x0000000005140000-memory.dmp

memory/2840-67-0x0000000074860000-0x0000000075011000-memory.dmp

memory/2840-68-0x0000000005130000-0x0000000005140000-memory.dmp

memory/2840-69-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/2840-70-0x0000000070CE0000-0x0000000071037000-memory.dmp

memory/2840-79-0x0000000007490000-0x0000000007534000-memory.dmp

memory/2840-80-0x00000000077C0000-0x00000000077D1000-memory.dmp

memory/2840-81-0x0000000007810000-0x0000000007825000-memory.dmp

memory/2840-84-0x0000000074860000-0x0000000075011000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/3016-86-0x0000000074860000-0x0000000075011000-memory.dmp

memory/3016-87-0x0000000002E20000-0x0000000002E30000-memory.dmp

memory/3016-88-0x0000000002E20000-0x0000000002E30000-memory.dmp

memory/3016-89-0x0000000005D00000-0x0000000006057000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 18aa3f0b88a70b17d0d51d8052790af6
SHA1 bf8c048932348eceabb9c4f08b52f6e45e3094fb
SHA256 c2c0c6113782dbf538a509fe392487a89fc15a46b23d55bc6d1b6a019ab625db
SHA512 6b4bc8e39a8971b6c04233216742f1c15045ec508377436e2c70b5ce8472b1cdb9c74030862d759594b3dffd7554ecc350d985077de20d6892e93b7821539511

memory/3016-99-0x0000000002E20000-0x0000000002E30000-memory.dmp

memory/3016-101-0x0000000070D20000-0x0000000071077000-memory.dmp

memory/3016-100-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/3016-111-0x0000000074860000-0x0000000075011000-memory.dmp

memory/1856-113-0x00000000031B0000-0x00000000031C0000-memory.dmp

memory/1856-112-0x0000000074860000-0x0000000075011000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5ccec4b127f457efae9f3624b7561cf4
SHA1 c9d1bc221591aad3263d2dc174c73c6e70ee5ec5
SHA256 55cfab00c880073af7105d9a1964da931d6d3b7f9a79473d589bd7ddc2819f8f
SHA512 9a4fce8ed1fb990b8edb74f0b66c63e80ddc3f250fb533129f5b8c51df603b5fada87e43b2ec4785c5b637dbc570a039c0b6c0e9d4968147969fc4eb6dc3204a

memory/4108-123-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1856-126-0x00000000031B0000-0x00000000031C0000-memory.dmp

memory/4108-127-0x0000000004E10000-0x0000000005212000-memory.dmp

memory/1856-130-0x0000000070D20000-0x0000000071077000-memory.dmp

memory/1856-129-0x000000007EEF0000-0x000000007EF00000-memory.dmp

memory/1856-128-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/1856-140-0x0000000074860000-0x0000000075011000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 aa64cf54033640aa3d03c340ef057bdf
SHA1 928c0735ff21c34d256819c79f78f3fc77111136
SHA256 dc22642ebb0b7d27a5406ae047c3543a7295abce61d7aa6c61dfdef153d5e729
SHA512 a0ffd772763c3ff06f50e279e1b824e44873978d0308349ba5d2702841e163a5e18fa6cfb675e36e0a6c4c24e0435bc4c4cb8be38cd4e28533d8a0847099481a

memory/4784-146-0x0000000005200000-0x0000000005600000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a14f8d76c05641f0491a44c090fd89c6
SHA1 529161452c0ed2c5ef0c466c640b9893f1a60bc1
SHA256 cf39a7350d776acd84e81351883f429fe66cca7ae392f00a79067b83b25e1188
SHA512 aa8860964511c86b7c175cc2c19552cfb692b3ef7a9623e8ca2588aba9a4fe743161f255b6e6d3b62d08eef5f363273ad8dd19b202fe3c5d3cec7416f94063af

memory/4108-181-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 eaaa2d6e0c4dbae6b244b05e62b4446d
SHA1 e812fa14798565711529e7281652a462a98088f2
SHA256 fbd36811ccc61ea10f93d316362c5a5fc32f617aa237cc5067963ca84cc1a9fb
SHA512 036bb3eb95e67cc8e2362a2730ed67767285e787b381fc7b46748ac7493e6be394104ae32294a749142bea91437d2dca0420c2946a9231d74dee4fb6a659e200

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4784-213-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4784-220-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3252-225-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2832-229-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4784-228-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-232-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-236-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2832-237-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4784-240-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-244-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-248-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2832-249-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4784-252-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-256-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-260-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4784-264-0x0000000000400000-0x000000000310E000-memory.dmp