Malware Analysis Report

2025-08-10 17:22

Sample ID 240417-xr6fdacd81
Target c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c
SHA256 c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c

Threat Level: Known bad

The file c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba

Glupteba payload

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 19:06

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 19:06

Reported

2024-04-17 19:08

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 67.32.209.4.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 11.58.22.2.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 a2d6cfae-27b5-4f0b-94c7-4af526612e4d.uuid.alldatadump.org udp
US 8.8.8.8:53 stun2.l.google.com udp
US 8.8.8.8:53 server16.alldatadump.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.130.233:443 cdn.discordapp.com tcp
NL 74.125.128.127:19302 stun2.l.google.com udp
BG 185.82.216.108:443 server16.alldatadump.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 8.8.8.8:53 127.128.125.74.in-addr.arpa udp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 233.130.159.162.in-addr.arpa udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
BG 185.82.216.108:443 server16.alldatadump.org tcp
US 8.8.8.8:53 31.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 216.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
BG 185.82.216.108:443 server16.alldatadump.org tcp

Files

memory/3696-1-0x0000000004D60000-0x0000000005166000-memory.dmp

memory/3696-2-0x0000000005170000-0x0000000005A5B000-memory.dmp

memory/3696-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1500-4-0x0000000003130000-0x0000000003166000-memory.dmp

memory/1500-5-0x0000000073F70000-0x0000000074720000-memory.dmp

memory/1500-7-0x00000000031E0000-0x00000000031F0000-memory.dmp

memory/1500-6-0x00000000031E0000-0x00000000031F0000-memory.dmp

memory/1500-8-0x00000000058B0000-0x0000000005ED8000-memory.dmp

memory/1500-9-0x0000000005840000-0x0000000005862000-memory.dmp

memory/1500-11-0x0000000005FC0000-0x0000000006026000-memory.dmp

memory/1500-10-0x0000000005F50000-0x0000000005FB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4xdpman4.gpn.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1500-21-0x00000000060F0000-0x0000000006444000-memory.dmp

memory/1500-22-0x0000000006720000-0x000000000673E000-memory.dmp

memory/1500-23-0x0000000006760000-0x00000000067AC000-memory.dmp

memory/1500-24-0x0000000006CC0000-0x0000000006D04000-memory.dmp

memory/1500-25-0x0000000007A50000-0x0000000007AC6000-memory.dmp

memory/1500-26-0x0000000008150000-0x00000000087CA000-memory.dmp

memory/1500-27-0x0000000007AF0000-0x0000000007B0A000-memory.dmp

memory/1500-30-0x000000006FE10000-0x000000006FE5C000-memory.dmp

memory/1500-29-0x0000000007CA0000-0x0000000007CD2000-memory.dmp

memory/1500-28-0x000000007EF10000-0x000000007EF20000-memory.dmp

memory/1500-31-0x0000000070200000-0x0000000070554000-memory.dmp

memory/1500-42-0x0000000007D00000-0x0000000007DA3000-memory.dmp

memory/1500-41-0x0000000007CE0000-0x0000000007CFE000-memory.dmp

memory/1500-43-0x0000000007DF0000-0x0000000007DFA000-memory.dmp

memory/1500-44-0x0000000007F00000-0x0000000007F96000-memory.dmp

memory/1500-45-0x0000000007E00000-0x0000000007E11000-memory.dmp

memory/1500-46-0x0000000007E40000-0x0000000007E4E000-memory.dmp

memory/1500-47-0x0000000007E60000-0x0000000007E74000-memory.dmp

memory/1500-48-0x0000000007EB0000-0x0000000007ECA000-memory.dmp

memory/1500-49-0x0000000007EA0000-0x0000000007EA8000-memory.dmp

memory/1500-52-0x0000000073F70000-0x0000000074720000-memory.dmp

memory/1372-54-0x0000000004D50000-0x0000000005154000-memory.dmp

memory/1372-55-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2852-57-0x00000000048E0000-0x00000000048F0000-memory.dmp

memory/2852-56-0x00000000048E0000-0x00000000048F0000-memory.dmp

memory/2852-63-0x00000000056A0000-0x00000000059F4000-memory.dmp

memory/1372-64-0x0000000005160000-0x0000000005A4B000-memory.dmp

memory/2852-69-0x0000000073F70000-0x0000000074720000-memory.dmp

memory/2852-70-0x000000006FE10000-0x000000006FE5C000-memory.dmp

memory/2852-73-0x000000007F840000-0x000000007F850000-memory.dmp

memory/2852-72-0x0000000070590000-0x00000000708E4000-memory.dmp

memory/2852-83-0x0000000006EA0000-0x0000000006F43000-memory.dmp

memory/2852-84-0x00000000048E0000-0x00000000048F0000-memory.dmp

memory/3696-71-0x0000000004D60000-0x0000000005166000-memory.dmp

memory/2852-85-0x00000000071D0000-0x00000000071E1000-memory.dmp

memory/2852-86-0x0000000007220000-0x0000000007234000-memory.dmp

memory/2852-89-0x0000000073F70000-0x0000000074720000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 3d086a433708053f9bf9523e1d87a4e8
SHA1 b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA256 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

memory/2848-91-0x0000000073F70000-0x0000000074720000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9e1ba10b41554fa3d1489d5f513ca2eb
SHA1 5e80f86f0fabe995a0eea8803f00f7f84ac86aba
SHA256 9043dc604af413ca757691cdfc885e54d1b9641bdb924f0511cc96294715beec
SHA512 5479eada44c1efb1fa46d1ac9c04d4d417460a732c8f3c50c9703919db83ec6fe7ef0f5448f96cf50c0ba2716aa1915466f0f8c5672223ac5aa289f29c1e3e75

memory/2848-101-0x0000000005D00000-0x0000000006054000-memory.dmp

memory/3696-103-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2848-105-0x0000000004D20000-0x0000000004D30000-memory.dmp

memory/2848-104-0x0000000004D20000-0x0000000004D30000-memory.dmp

memory/2848-106-0x000000006FE10000-0x000000006FE5C000-memory.dmp

memory/2848-117-0x0000000004D20000-0x0000000004D30000-memory.dmp

memory/2848-107-0x000000006FF90000-0x00000000702E4000-memory.dmp

memory/2848-119-0x0000000073F70000-0x0000000074720000-memory.dmp

memory/3976-122-0x00000000027F0000-0x0000000002800000-memory.dmp

memory/3976-121-0x00000000027F0000-0x0000000002800000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1a8bbabbe248ba35890ec6496b6773ba
SHA1 449d49b9425acf6c6252953e1612602a01830796
SHA256 31d0df1d28dccc22bf2ce64f2a2e6a8c6cd22247e51304dc6dec5e4bcc303d01
SHA512 7dd754a04f17366cbc123f5440d54856bef0d0320dd98dcc97c0e1887d84a2c4d8559e2535d7eb9f1f8eb15c6a240cd315334eda03e526976d59c3feb6506370

memory/3976-120-0x0000000073F70000-0x0000000074720000-memory.dmp

memory/3976-134-0x000000006FE10000-0x000000006FE5C000-memory.dmp

memory/3976-135-0x0000000070590000-0x00000000708E4000-memory.dmp

memory/1372-145-0x0000000004D50000-0x0000000005154000-memory.dmp

memory/1372-146-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 5d9058de062eff416ffe9afa2e0e418c
SHA1 250a4a403eeb0e8c6c9af4c963ed4b95106288ae
SHA256 c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c
SHA512 964e1d0816d7717b147a1380bb3f19bb788263a5e059f9ee049d4f7839d809d513f326a0ad0f9eaf2baee75d2ed1e20c4d626e3779ee004c514c168980dec1a6

memory/1372-152-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1299b9128f70203e22f1051811954ef3
SHA1 dc38188aeb6adefb2aa8c9989d4de6fac7591a56
SHA256 2b60d2a9914c0f3ab8baaa1c616083406396cae879c6d6706c0017cf80dac672
SHA512 8dbb250056942dc8ea62153b6a159e135b14a7e59611ee4560f78b4d33396e0f8103302496635dbc04cedd132676d14b03b74ce7a066f3b4a65367b4359e6787

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a20db695061a6236e3325724dc0723e8
SHA1 b62f8d4bac0c0475f324b06526335cad100c0d16
SHA256 6f94bab41f41f66abd6b5c527a6c1156ccf14e708b7b3d939c92c61144a1cc30
SHA512 a42027e3ace02f3415f7abe35879c64427e0840493ad7530f7d0b6919b9e95d15792209590a4b4dbd392498628dec2051668ea5b978af544cb5f65dc83db0883

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 ce0c089806bcf694350ec46b4a08eb55
SHA1 592a9879e1fa79f4d884c73185a76985e647870b
SHA256 ad2e28086b160f014b4cd4816699fbb58445b2425f38d0453223080c95c7ab91
SHA512 b0390155a0a425823b709d93617c3b4514149f5b9b8571aba71151a5d258fdee661d960e7f78246a35a7e51563a0a2260547c7c15b0e1cc85ee9b1917efff057

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4212-252-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/3236-259-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4212-262-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3448-263-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4212-265-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-268-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3448-269-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4212-271-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-274-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-277-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-280-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-283-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-286-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-289-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-292-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-295-0x0000000000400000-0x000000000310E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 19:06

Reported

2024-04-17 19:08

Platform

win11-20240412-en

Max time kernel

1s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe

"C:\Users\Admin\AppData\Local\Temp\c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
BE 172.253.120.127:19302 stun1.l.google.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.108:443 server4.alldatadump.org tcp
US 8.8.8.8:53 108.216.82.185.in-addr.arpa udp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.108:443 server4.alldatadump.org tcp
BG 185.82.216.108:443 server4.alldatadump.org tcp
BG 185.82.216.108:443 server4.alldatadump.org tcp

Files

memory/4644-1-0x0000000004F60000-0x0000000005359000-memory.dmp

memory/4644-2-0x0000000005360000-0x0000000005C4B000-memory.dmp

memory/4644-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4288-4-0x0000000005260000-0x0000000005296000-memory.dmp

memory/4288-5-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/4288-6-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4288-8-0x00000000058E0000-0x0000000005F0A000-memory.dmp

memory/4288-7-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4288-9-0x0000000005F60000-0x0000000005F82000-memory.dmp

memory/4288-11-0x00000000060E0000-0x0000000006146000-memory.dmp

memory/4288-10-0x0000000006000000-0x0000000006066000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ggbbxoy.yvn.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4288-20-0x00000000061D0000-0x0000000006527000-memory.dmp

memory/4288-21-0x00000000066F0000-0x000000000670E000-memory.dmp

memory/4288-22-0x0000000006740000-0x000000000678C000-memory.dmp

memory/4288-23-0x0000000007870000-0x00000000078B6000-memory.dmp

memory/4288-26-0x0000000070B50000-0x0000000070B9C000-memory.dmp

memory/4288-25-0x0000000007B20000-0x0000000007B54000-memory.dmp

memory/4288-27-0x0000000070CD0000-0x0000000071027000-memory.dmp

memory/4288-36-0x0000000007B60000-0x0000000007B7E000-memory.dmp

memory/4288-37-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4288-38-0x0000000007B80000-0x0000000007C24000-memory.dmp

memory/4288-24-0x000000007F210000-0x000000007F220000-memory.dmp

memory/4288-40-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

memory/4288-39-0x00000000082F0000-0x000000000896A000-memory.dmp

memory/4288-41-0x0000000007CF0000-0x0000000007CFA000-memory.dmp

memory/4288-42-0x0000000007E00000-0x0000000007E96000-memory.dmp

memory/4288-43-0x0000000007D10000-0x0000000007D21000-memory.dmp

memory/4288-44-0x0000000007D60000-0x0000000007D6E000-memory.dmp

memory/4288-45-0x0000000007D70000-0x0000000007D85000-memory.dmp

memory/4288-46-0x0000000007DC0000-0x0000000007DDA000-memory.dmp

memory/4288-47-0x0000000007DE0000-0x0000000007DE8000-memory.dmp

memory/4288-50-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/1044-52-0x0000000004E60000-0x000000000525E000-memory.dmp

memory/1044-53-0x0000000005260000-0x0000000005B4B000-memory.dmp

memory/1044-54-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3336-65-0x0000000005420000-0x0000000005430000-memory.dmp

memory/4644-66-0x0000000004F60000-0x0000000005359000-memory.dmp

memory/3336-67-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/3336-64-0x0000000005420000-0x0000000005430000-memory.dmp

memory/3336-63-0x0000000006090000-0x00000000063E7000-memory.dmp

memory/3336-68-0x0000000070B50000-0x0000000070B9C000-memory.dmp

memory/3336-69-0x0000000071560000-0x00000000718B7000-memory.dmp

memory/3336-78-0x0000000007610000-0x00000000076B4000-memory.dmp

memory/3336-80-0x000000007F670000-0x000000007F680000-memory.dmp

memory/3336-81-0x0000000005420000-0x0000000005430000-memory.dmp

memory/3336-82-0x0000000005420000-0x0000000005430000-memory.dmp

memory/4644-79-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3336-83-0x0000000007B30000-0x0000000007B41000-memory.dmp

memory/3336-84-0x0000000007B80000-0x0000000007B95000-memory.dmp

memory/3336-87-0x00000000748E0000-0x0000000075091000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 ac4917a885cf6050b1a483e4bc4d2ea5
SHA1 b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256 e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512 092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

memory/2324-91-0x0000000002550000-0x0000000002560000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 dec1bed035e51d941ca4952962ce6f59
SHA1 4c8dd2b3e3603cbb709c69e0d191b82455f22526
SHA256 9b423548154eab13b7e050d8da6fc37281994c8eeb6b5709537ae62872fbd5b5
SHA512 779f6e77ce8bfbaeaa194a78d337c37653e1b0426b55bd3ffea87237947f3b315e28d8d3019d8cec2aa159af4c0acd8b4216409aaf17d9f9e5518e7100ddcd8b

memory/2324-100-0x0000000005570000-0x00000000058C7000-memory.dmp

memory/2324-90-0x0000000002550000-0x0000000002560000-memory.dmp

memory/2324-89-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/2324-104-0x0000000071490000-0x00000000717E7000-memory.dmp

memory/2324-113-0x0000000002550000-0x0000000002560000-memory.dmp

memory/2324-114-0x0000000002550000-0x0000000002560000-memory.dmp

memory/2324-103-0x0000000070B50000-0x0000000070B9C000-memory.dmp

memory/2324-102-0x000000007F160000-0x000000007F170000-memory.dmp

memory/2324-116-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/3604-118-0x00000000748E0000-0x0000000075091000-memory.dmp

memory/1044-119-0x0000000004E60000-0x000000000525E000-memory.dmp

memory/3604-121-0x00000000058E0000-0x0000000005C37000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8d4abc0330bec946b074a73dcbbe1c52
SHA1 9d5956d34f26a75b689afe8b5679d6e102d4aa34
SHA256 0721bd398d4422262c90c23ce49088a2b440054430e71c5bcc3ee4383533b7e1
SHA512 7888b2c94fd27d416e86980a3dc3b6c2fed278bfdbb8aee201401347afc1a1aacc8673dfdc39059d44c24581334b624e3805278dfc01eeb8d2795c2a3de972aa

memory/3604-120-0x00000000048E0000-0x00000000048F0000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 5d9058de062eff416ffe9afa2e0e418c
SHA1 250a4a403eeb0e8c6c9af4c963ed4b95106288ae
SHA256 c329c3225b5948039252cdda9b728f19f2f9a175f1c899b482d9fdc1c087d09c
SHA512 964e1d0816d7717b147a1380bb3f19bb788263a5e059f9ee049d4f7839d809d513f326a0ad0f9eaf2baee75d2ed1e20c4d626e3779ee004c514c168980dec1a6

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 0265a6789422294c55aae90f050def26
SHA1 95aa1d29e23074c2780f087cf3e2eedcc211926f
SHA256 a461be9fe837171128ea706d1db0151321832e62c71192ffa735ce88ed6c3732
SHA512 b432d4b87830cd3c2598bfae0c935c6d5635a0d3995dea7a83f584f72ae6f015a2934a8682ac82414720650ae99938151b6492668de9b43912481ea1a8742c20

memory/1044-178-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 582d1a25176b547e4ce6ac54bdcea359
SHA1 601fe21cd95e75fa9570656ba74761418d391f83
SHA256 0f290576cf111950a544b1f08f196cbf52af3ccfea079c529af854d367911e0d
SHA512 e46d2d6d7666258596a9dc86ceead9a01675d333e00386c2c062f9005b39fcc79f1ecb783cb19d30d1a143d231e9b1e61398717e2fbb4a2236221c2bd10ab187

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e0004572a6e922e1d9c534cedf848eb6
SHA1 22a57321ebd1f9a5a3f6110f8ee985e478e56253
SHA256 c4812984edeed64602dbb786daedf1a2b81e868f3846845c97e297742423d486
SHA512 c8475a5befd83e5901fb57274b09181be49dc9edb2846c50cc43d984a56f80ff2644827d71c2bc2ec5f14119fbe94324e5be5ae94fdbceabe715f7c62429d507

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/4308-241-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/72-249-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4308-252-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2560-255-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4308-256-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-260-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2560-263-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4308-264-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-268-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-272-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2560-275-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/4308-276-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-280-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-284-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-288-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-292-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4308-296-0x0000000000400000-0x000000000310E000-memory.dmp