Malware Analysis Report

2025-08-10 17:22

Sample ID 240417-xsc58abb48
Target 8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82
SHA256 8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82

Threat Level: Known bad

The file 8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82 was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba payload

Glupteba

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 19:06

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 19:06

Reported

2024-04-17 19:09

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
BE 88.221.83.225:443 www.bing.com tcp
US 8.8.8.8:53 11.58.22.2.in-addr.arpa udp
US 8.8.8.8:53 225.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 39a6114c-109e-4f8e-8347-01ff70b8c8d9.uuid.createupdate.org udp
US 8.8.8.8:53 stun.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server8.createupdate.org udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 74.125.250.129:19302 stun.l.google.com udp
BG 185.82.216.104:443 server8.createupdate.org tcp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.104:443 server8.createupdate.org tcp
BG 185.82.216.104:443 server8.createupdate.org tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
BG 185.82.216.104:443 server8.createupdate.org tcp
GB 217.20.56.37:80 tcp

Files

memory/4212-1-0x0000000004E50000-0x0000000005254000-memory.dmp

memory/4212-2-0x0000000005260000-0x0000000005B4B000-memory.dmp

memory/4212-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/452-4-0x0000000005410000-0x0000000005446000-memory.dmp

memory/452-7-0x00000000054D0000-0x00000000054E0000-memory.dmp

memory/452-8-0x0000000005B10000-0x0000000006138000-memory.dmp

memory/452-6-0x00000000054D0000-0x00000000054E0000-memory.dmp

memory/452-9-0x0000000006140000-0x0000000006162000-memory.dmp

memory/452-11-0x0000000006380000-0x00000000063E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jdgi4djy.ylm.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/452-10-0x00000000061E0000-0x0000000006246000-memory.dmp

memory/452-5-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/452-21-0x00000000063F0000-0x0000000006744000-memory.dmp

memory/452-22-0x00000000069D0000-0x00000000069EE000-memory.dmp

memory/452-23-0x0000000006A00000-0x0000000006A4C000-memory.dmp

memory/452-24-0x0000000006EF0000-0x0000000006F34000-memory.dmp

memory/452-25-0x0000000007C80000-0x0000000007CF6000-memory.dmp

memory/452-27-0x0000000007D90000-0x0000000007DAA000-memory.dmp

memory/452-26-0x00000000083E0000-0x0000000008A5A000-memory.dmp

memory/452-41-0x0000000007F80000-0x0000000007F9E000-memory.dmp

memory/452-43-0x00000000054D0000-0x00000000054E0000-memory.dmp

memory/452-44-0x0000000008090000-0x000000000809A000-memory.dmp

memory/452-45-0x00000000081B0000-0x0000000008246000-memory.dmp

memory/452-42-0x0000000007FA0000-0x0000000008043000-memory.dmp

memory/452-31-0x00000000709B0000-0x0000000070D04000-memory.dmp

memory/452-30-0x00000000705E0000-0x000000007062C000-memory.dmp

memory/452-29-0x000000007EE50000-0x000000007EE60000-memory.dmp

memory/452-46-0x00000000080B0000-0x00000000080C1000-memory.dmp

memory/452-28-0x0000000007F40000-0x0000000007F72000-memory.dmp

memory/452-47-0x00000000080F0000-0x00000000080FE000-memory.dmp

memory/452-49-0x0000000008150000-0x000000000816A000-memory.dmp

memory/452-48-0x0000000008110000-0x0000000008124000-memory.dmp

memory/452-50-0x0000000008140000-0x0000000008148000-memory.dmp

memory/452-53-0x0000000074740000-0x0000000074EF0000-memory.dmp

memory/4212-54-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4212-55-0x0000000005260000-0x0000000005B4B000-memory.dmp

memory/392-57-0x0000000004E40000-0x0000000005247000-memory.dmp

memory/2336-60-0x0000000004630000-0x0000000004640000-memory.dmp

memory/2336-59-0x0000000004630000-0x0000000004640000-memory.dmp

memory/2336-67-0x00000000747E0000-0x0000000074F90000-memory.dmp

memory/2336-66-0x00000000054F0000-0x0000000005844000-memory.dmp

memory/392-58-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2336-72-0x0000000005B60000-0x0000000005BAC000-memory.dmp

memory/2336-86-0x0000000004630000-0x0000000004640000-memory.dmp

memory/2336-85-0x0000000006CF0000-0x0000000006D93000-memory.dmp

memory/2336-75-0x0000000070E80000-0x00000000711D4000-memory.dmp

memory/2336-74-0x00000000706E0000-0x000000007072C000-memory.dmp

memory/2336-73-0x000000007FD20000-0x000000007FD30000-memory.dmp

memory/2336-87-0x0000000007020000-0x0000000007031000-memory.dmp

memory/2336-88-0x0000000007070000-0x0000000007084000-memory.dmp

memory/2336-91-0x00000000747E0000-0x0000000074F90000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/4744-94-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4744-95-0x00000000052A0000-0x00000000052B0000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 8f267578cd66f29d9b524f88e692360f
SHA1 14cff1149db804cecf77b4cd6b389342c08a0bb8
SHA256 fee34275929e08f264fe0a9fa15a7e49806431b77033d0fa7f2e64eca8908fd8
SHA512 8dfd8c88648bc6c9f6542e008fbdc9667e0953bb0b91b91082a08e5733f1c864cf0ac00bfe360cefc2b1b0ad80aaefd5387769b245caa24d8e7f9a6c393c1538

memory/4744-105-0x0000000006260000-0x00000000065B4000-memory.dmp

memory/4744-93-0x00000000747E0000-0x0000000074F90000-memory.dmp

memory/392-119-0x0000000004E40000-0x0000000005247000-memory.dmp

memory/4744-121-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4744-120-0x00000000052A0000-0x00000000052B0000-memory.dmp

memory/4744-109-0x0000000070870000-0x0000000070BC4000-memory.dmp

memory/4744-108-0x00000000706E0000-0x000000007072C000-memory.dmp

memory/4744-107-0x000000007FD80000-0x000000007FD90000-memory.dmp

memory/4744-123-0x00000000747E0000-0x0000000074F90000-memory.dmp

memory/4988-124-0x00000000747E0000-0x0000000074F90000-memory.dmp

memory/4988-135-0x0000000002A00000-0x0000000002A10000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6313b02644f393629257a297a5cbbf9f
SHA1 d845ed067d217d082a3410d25559e0150bbacfbb
SHA256 6af36fec377434a3a73ec62063218eabe3d7268b0270ccff8c0789a8bd9c9ccd
SHA512 a7bafa84a568dca3ad2431955c398e5c75613b8b523975e248144406a7a869bfee8837588daac47e69b162b968000b12350f9d991b760ffbe76729cc3d34bde9

memory/4988-125-0x0000000002A00000-0x0000000002A10000-memory.dmp

memory/392-137-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 2219ba45ba1b1523d588b8ed4b606551
SHA1 e6572a226acb1bde6ef22383a4a4162866dcd946
SHA256 0ad9e4469ba50c24d80b822ef51dbafafc09622219eaeff81813e93e48c48621
SHA512 49edc1a4c860c20f1ddc54222f53a1b3137ba8282ee6d41cc4bdd789b4f9b376195bae961bd47ac324adee28a0b291765956d1241b72a4737f582e415d50926f

C:\Windows\rss\csrss.exe

MD5 b4227aa717f62887f9c6a8a9feec6db0
SHA1 dbf2e122762c532e5f57bf480bb0ec736b7c999a
SHA256 8189e292a30ff275b0d731e864cc9fcebec3743f047284be8f52c3ad6a8bb7d8
SHA512 5124e8cfcc491baead8cc8e6aca988b64ca80a71a58dcd4a6bfadbb5811a229f962a1bc1b75621847b6e5ccf54a386d2f042742c585466ab1822023e8129f366

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 63ee09316da2dd426552a9dc8804b9ab
SHA1 6cd36f7576d443debe2fffa664435a7b3b3e321c
SHA256 139258e6dd4aae121802c45a92b9de652a5d82a9e3df6b5c465f31ebb0d26030
SHA512 bbc00db1b3b0221841ad93f1c95dee9f1bde5294166193a978d83bcb07e669312b1011c461ab6986ce406a307d2165273697077511ae56dbd539176df59ff025

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 6d4c558a163280c4fdcb0bcfaaf63cc5
SHA1 cfaf533416d828e11bbdb6d36f248fe4e28f9def
SHA256 6d6cdf4aff90b8e1d5508d7cacc16010dad816c615665dfd3cdc95507221eeea
SHA512 56f1e12fbfdf34e3ce3489ae426c36b02db0b25798e688a792f203a36a827bd154739f2e4f82db51473b75cde02af55017692d6af8c4c5e48d4ab94e540392c5

memory/392-222-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 e393dc13fa7f16c5f2806d2309bdcc17
SHA1 773e22f02d73f0f5034bac9278ae512d6a9d15cd
SHA256 ef1e10015b8931c9f92a448dfc2f0775ea9e0615a587bf6f47a505c6eb26aef0
SHA512 7385279e265fa1c4150775669a4fdf5db28e6efe0189ca84e734491d6f0a129c0b0b81e29361cf71207b5bba2ac97d57f35f562feef1172fee751ceb23e34607

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2120-260-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4340-268-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2120-270-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3384-272-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2120-273-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-276-0x0000000000400000-0x000000000310E000-memory.dmp

memory/3384-278-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2120-279-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-282-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-285-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-288-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-291-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-294-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-297-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-300-0x0000000000400000-0x000000000310E000-memory.dmp

memory/2120-303-0x0000000000400000-0x000000000310E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 19:06

Reported

2024-04-17 19:09

Platform

win11-20240412-en

Max time kernel

1s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe

"C:\Users\Admin\AppData\Local\Temp\8374fa60fcccec5f6d649f5f1347b981c8bcfd2904d6e06b855469c6dc619a82.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 d64991da-ccae-4788-a2c9-e79c177982ac.uuid.createupdate.org udp
US 8.8.8.8:53 server4.createupdate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 74.125.250.129:19302 stun.l.google.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server4.createupdate.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
BG 185.82.216.104:443 server4.createupdate.org tcp
BG 185.82.216.104:443 server4.createupdate.org tcp
BG 185.82.216.104:443 server4.createupdate.org tcp

Files

memory/3744-2-0x0000000005220000-0x0000000005B0B000-memory.dmp

memory/3744-1-0x0000000004E20000-0x0000000005220000-memory.dmp

memory/3744-3-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1320-4-0x00000000029A0000-0x00000000029D6000-memory.dmp

memory/1320-6-0x0000000004B40000-0x0000000004B50000-memory.dmp

memory/1320-7-0x0000000004B40000-0x0000000004B50000-memory.dmp

memory/1320-8-0x0000000005180000-0x00000000057AA000-memory.dmp

memory/1320-5-0x0000000074B40000-0x00000000752F1000-memory.dmp

memory/1320-9-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

memory/1320-11-0x00000000057B0000-0x0000000005816000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5f4djbsl.rdk.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1320-10-0x0000000005040000-0x00000000050A6000-memory.dmp

memory/1320-20-0x0000000005920000-0x0000000005C77000-memory.dmp

memory/1320-21-0x0000000005E80000-0x0000000005E9E000-memory.dmp

memory/1320-22-0x0000000005EA0000-0x0000000005EEC000-memory.dmp

memory/1320-23-0x0000000006410000-0x0000000006456000-memory.dmp

memory/1320-36-0x00000000072D0000-0x00000000072EE000-memory.dmp

memory/1320-38-0x0000000004B40000-0x0000000004B50000-memory.dmp

memory/1320-37-0x00000000072F0000-0x0000000007394000-memory.dmp

memory/1320-27-0x0000000070F30000-0x0000000071287000-memory.dmp

memory/1320-39-0x0000000007A60000-0x00000000080DA000-memory.dmp

memory/1320-40-0x0000000007420000-0x000000000743A000-memory.dmp

memory/1320-26-0x0000000070DB0000-0x0000000070DFC000-memory.dmp

memory/1320-25-0x0000000007290000-0x00000000072C4000-memory.dmp

memory/1320-41-0x0000000007460000-0x000000000746A000-memory.dmp

memory/1320-42-0x0000000007570000-0x0000000007606000-memory.dmp

memory/1320-24-0x000000007F520000-0x000000007F530000-memory.dmp

memory/1320-43-0x0000000007480000-0x0000000007491000-memory.dmp

memory/1320-44-0x00000000074D0000-0x00000000074DE000-memory.dmp

memory/1320-46-0x0000000007530000-0x000000000754A000-memory.dmp

memory/1320-45-0x00000000074E0000-0x00000000074F5000-memory.dmp

memory/1320-47-0x0000000007550000-0x0000000007558000-memory.dmp

memory/1320-50-0x0000000074B40000-0x00000000752F1000-memory.dmp

memory/2704-52-0x0000000004EB0000-0x00000000052B6000-memory.dmp

memory/3744-53-0x0000000004E20000-0x0000000005220000-memory.dmp

memory/672-54-0x0000000005960000-0x0000000005CB7000-memory.dmp

memory/2704-63-0x0000000000400000-0x000000000310E000-memory.dmp

memory/672-64-0x0000000002740000-0x0000000002750000-memory.dmp

memory/672-65-0x0000000002740000-0x0000000002750000-memory.dmp

memory/3744-66-0x0000000005220000-0x0000000005B0B000-memory.dmp

memory/672-67-0x0000000074B40000-0x00000000752F1000-memory.dmp

memory/672-69-0x0000000070DB0000-0x0000000070DFC000-memory.dmp

memory/672-70-0x0000000071000000-0x0000000071357000-memory.dmp

memory/672-79-0x0000000007130000-0x00000000071D4000-memory.dmp

memory/672-68-0x000000007F6E0000-0x000000007F6F0000-memory.dmp

memory/672-81-0x0000000002740000-0x0000000002750000-memory.dmp

memory/3744-80-0x0000000000400000-0x000000000310E000-memory.dmp

memory/672-82-0x00000000073C0000-0x00000000073D1000-memory.dmp

memory/672-83-0x0000000007410000-0x0000000007425000-memory.dmp

memory/672-86-0x0000000074B40000-0x00000000752F1000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/804-89-0x0000000004B70000-0x0000000004B80000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 5459b4c356255d59d65848cefcad3718
SHA1 5d05b4def18ff153e8cd46ef06f4f958ff1e102a
SHA256 64800495b44fb5e45c351c0639ebf821fb16d6f4769becb537fa21e5086fc277
SHA512 fe8bb4c12b74b4392b71d9441a9a2ba16b8544cff33bf3e46555de59f180952f959164f7085461e15f8716d063077e5135e2636e1dbf81e47849b45d4f282b67

memory/804-99-0x0000000004B70000-0x0000000004B80000-memory.dmp

memory/804-98-0x0000000005B10000-0x0000000005E67000-memory.dmp

memory/804-88-0x0000000074B40000-0x00000000752F1000-memory.dmp

memory/804-103-0x0000000070F50000-0x00000000712A7000-memory.dmp

memory/2704-112-0x0000000004EB0000-0x00000000052B6000-memory.dmp

memory/804-113-0x0000000004B70000-0x0000000004B80000-memory.dmp

memory/804-102-0x0000000070DB0000-0x0000000070DFC000-memory.dmp

memory/804-101-0x000000007F850000-0x000000007F860000-memory.dmp

memory/804-115-0x0000000074B40000-0x00000000752F1000-memory.dmp

memory/4612-116-0x0000000074B40000-0x00000000752F1000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 1be12dec8a4b1df00663c8be58fe6ffa
SHA1 60b878589562d6634164dcbdca28257c86e026df
SHA256 474f4866800d8133feae1943bd0fdd86a9e41763c1a05c454241ab4b3823f17f
SHA512 5b0f5fe1fd7089a5e2a018a13451bb1a9cc131811baa3c3dde57843ffb8c111ec2e3068f6d40a981053892a7e968b6626f1c87b281dcbedbb5a5a36f318f84ba

memory/4612-117-0x00000000024B0000-0x00000000024C0000-memory.dmp

memory/2704-127-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4612-129-0x0000000070DB0000-0x0000000070DFC000-memory.dmp

memory/4612-130-0x0000000071000000-0x0000000071357000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 b4227aa717f62887f9c6a8a9feec6db0
SHA1 dbf2e122762c532e5f57bf480bb0ec736b7c999a
SHA256 8189e292a30ff275b0d731e864cc9fcebec3743f047284be8f52c3ad6a8bb7d8
SHA512 5124e8cfcc491baead8cc8e6aca988b64ca80a71a58dcd4a6bfadbb5811a229f962a1bc1b75621847b6e5ccf54a386d2f042742c585466ab1822023e8129f366

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3846553e7f59cbf95f38066f9efaf67c
SHA1 342e335b4e0bcac58ed41e3e6fd9751e0bbd9b2b
SHA256 f04703a0de7f31e5a01f582e362666de286ccc1b437666f65ddc014ba6f478e3
SHA512 d50ce16842de88400ac88dbe92b90503cd7d4c455e2edb11b6266ed4c5a64b8f830ef5d68e566d8eb45db05d9936e0bf9337efd9cd7617b9320d08e866625ce7

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 36aaf28faeb8f4487e95a5e2f48da2f4
SHA1 2580ad09d6beab71b57a2c83a12ff3003bb3af7c
SHA256 9826049a79f90fb960fbf03443dc2e388422019b87753e560226492753a0b2e2
SHA512 a88b133803ef7974446ae090329c1167318dba2aa87628d6283963a65d7de79112c61927e3e6087aa00f5875cf74bf2c100fce71efac4939aea21333f9fa9a6c

memory/2704-189-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 81e3c998e6dac5a109d0ef2b5b4790ab
SHA1 2cb6ed1f0a0ba2c3fe5b915e5b5cc95cc8b54723
SHA256 dd1849cae097e176366cddec527d7bed5e9035fd38e1ef82f07ec7ee2488b549
SHA512 64876f91caf1f6f1ed00515e56612383565c9289af817c1a98abfd3ab5c16a132532c09c68afcdb428b20e92a3ccc026b50bb07f9a336bf6aa7ab915f58d8f60

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/1276-240-0x0000000000400000-0x000000000310E000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4584-248-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1276-251-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4024-253-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1276-255-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-259-0x0000000000400000-0x000000000310E000-memory.dmp

memory/4024-261-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/1276-263-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-267-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-271-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-275-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-279-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-283-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-287-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-291-0x0000000000400000-0x000000000310E000-memory.dmp

memory/1276-295-0x0000000000400000-0x000000000310E000-memory.dmp