Malware Analysis Report

2025-08-10 17:22

Sample ID 240417-ysxejaeb7v
Target 910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
SHA256 910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
Tags
glupteba dropper evasion loader upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056

Threat Level: Known bad

The file 910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056 was found to be: Known bad.

Malicious Activity Summary

glupteba dropper evasion loader upx

Glupteba payload

Glupteba

Modifies Windows Firewall

UPX packed file

Launches sc.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-17 20:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 20:03

Reported

2024-04-17 20:06

Platform

win10v2004-20240412-en

Max time kernel

1s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 216.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 198.32.209.4.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
BE 2.17.196.82:443 www.bing.com tcp
US 8.8.8.8:53 82.196.17.2.in-addr.arpa udp
US 8.8.8.8:53 7987184a-1291-45ba-b6b5-9fd75a3983e5.uuid.createupdate.org udp
US 8.8.8.8:53 stun1.l.google.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server10.createupdate.org udp
US 162.159.129.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server10.createupdate.org tcp
BE 172.253.120.127:19302 stun1.l.google.com udp
US 8.8.8.8:53 127.120.253.172.in-addr.arpa udp
US 8.8.8.8:53 carsalessystem.com udp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
BG 185.82.216.104:443 server10.createupdate.org tcp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
BG 185.82.216.104:443 server10.createupdate.org tcp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/1288-1-0x0000000004E70000-0x000000000526D000-memory.dmp

memory/1288-2-0x0000000005270000-0x0000000005B5B000-memory.dmp

memory/1288-3-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1160-4-0x00000000028C0000-0x00000000028F6000-memory.dmp

memory/1160-5-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/1160-8-0x0000000002930000-0x0000000002940000-memory.dmp

memory/1160-6-0x0000000002930000-0x0000000002940000-memory.dmp

memory/1160-7-0x0000000005050000-0x0000000005678000-memory.dmp

memory/1160-10-0x0000000004F80000-0x0000000004FE6000-memory.dmp

memory/1160-11-0x00000000056F0000-0x0000000005756000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nwdyxzfr.t15.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1160-9-0x0000000004EE0000-0x0000000004F02000-memory.dmp

memory/1160-21-0x00000000059A0000-0x0000000005CF4000-memory.dmp

memory/1160-22-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

memory/1160-23-0x0000000005F70000-0x0000000005FBC000-memory.dmp

memory/1160-24-0x0000000006410000-0x0000000006454000-memory.dmp

memory/1160-25-0x0000000007200000-0x0000000007276000-memory.dmp

memory/1160-27-0x0000000007280000-0x000000000729A000-memory.dmp

memory/1160-26-0x0000000007900000-0x0000000007F7A000-memory.dmp

memory/1160-41-0x0000000007480000-0x000000000749E000-memory.dmp

memory/1160-31-0x0000000070CE0000-0x0000000071034000-memory.dmp

memory/1160-42-0x00000000074A0000-0x0000000007543000-memory.dmp

memory/1160-44-0x0000000007590000-0x000000000759A000-memory.dmp

memory/1160-45-0x0000000007650000-0x00000000076E6000-memory.dmp

memory/1160-46-0x00000000075B0000-0x00000000075C1000-memory.dmp

memory/1160-43-0x0000000002930000-0x0000000002940000-memory.dmp

memory/1160-30-0x0000000070B60000-0x0000000070BAC000-memory.dmp

memory/1160-29-0x0000000007440000-0x0000000007472000-memory.dmp

memory/1160-28-0x000000007F7B0000-0x000000007F7C0000-memory.dmp

memory/1160-47-0x00000000075F0000-0x00000000075FE000-memory.dmp

memory/1160-48-0x0000000007600000-0x0000000007614000-memory.dmp

memory/1160-49-0x00000000076F0000-0x000000000770A000-memory.dmp

memory/1160-50-0x0000000007640000-0x0000000007648000-memory.dmp

memory/1160-53-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/3112-55-0x0000000004DE0000-0x00000000051E7000-memory.dmp

memory/1288-56-0x0000000004E70000-0x000000000526D000-memory.dmp

memory/1380-62-0x0000000006330000-0x0000000006684000-memory.dmp

memory/3112-63-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1380-68-0x0000000003470000-0x0000000003480000-memory.dmp

memory/1380-69-0x0000000003470000-0x0000000003480000-memory.dmp

memory/1288-70-0x0000000005270000-0x0000000005B5B000-memory.dmp

memory/1380-71-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/1380-72-0x0000000070B60000-0x0000000070BAC000-memory.dmp

memory/1380-83-0x0000000007C00000-0x0000000007CA3000-memory.dmp

memory/1380-73-0x0000000071300000-0x0000000071654000-memory.dmp

memory/1380-85-0x0000000003470000-0x0000000003480000-memory.dmp

memory/1288-84-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1380-86-0x0000000007EB0000-0x0000000007EC1000-memory.dmp

memory/1380-87-0x0000000007F00000-0x0000000007F14000-memory.dmp

memory/1380-90-0x0000000074CC0000-0x0000000075470000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/5116-93-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/5116-103-0x0000000005EF0000-0x0000000006244000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 db695b2f7f845b6fa0b7521edb78ab6f
SHA1 36172fe0f05209a8357a6afd6ef988bd3e86c159
SHA256 8d4ac536e276eee9f5442aeb51356f1f984021bebefa1b9029c47cf9d422e118
SHA512 14b9db5f58e685561c77cd558fdab9c00429aaf9425e4f83cbe84d57dc37f1a7fa2fa13a81f18dc484f0fdfcdb2d8b2a8a462a547870a7f831a2f0b9c55a5491

memory/5116-92-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/5116-118-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/5116-119-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/3112-117-0x0000000004DE0000-0x00000000051E7000-memory.dmp

memory/5116-107-0x0000000071310000-0x0000000071664000-memory.dmp

memory/5116-106-0x0000000070B60000-0x0000000070BAC000-memory.dmp

memory/5116-105-0x000000007F5C0000-0x000000007F5D0000-memory.dmp

memory/5116-121-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/2148-122-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/2148-125-0x0000000006150000-0x00000000064A4000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 3487e91564c9d3116f38d4a22e57ecad
SHA1 695e98305075cbbec72070e0f73453c86b902b95
SHA256 92fceb535738e19759dcaafc512fc305c58f848c2437cfc6e59b33fc636dbd40
SHA512 6ae55403b285bc4e7f5f1ad3c933fdc44664c33e0b1848a003f33822538e6bdb6a8a392fb092f3e0e2ed519d37c45b77b4ca6ca71c2882598fdd360fccb4ee66

memory/2148-124-0x0000000005300000-0x0000000005310000-memory.dmp

memory/2148-123-0x0000000005300000-0x0000000005310000-memory.dmp

memory/2148-136-0x0000000070B60000-0x0000000070BAC000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 366d84826a079b4734a8746276b8dd35
SHA1 e9baa1e8612c13ff936948df8e7077d191330453
SHA256 910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
SHA512 60f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 cbc3a32675827d3e1c14c9fb4217c245
SHA1 7af2031a271cdc07b94bff05f28fa8491404938f
SHA256 c5bb639d36f2a2f07b2c8b9a55933593df3d6693917239cf18f19bfcc226e691
SHA512 7c86bbd04cdaa7f72bd4ca2fef5805cf2582263a67fad53336d55593eb7e094052dc7c716ad85ae99e350439ea56a2b6018b63697aec4dadc027b42c43175869

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 67a4ab7117bdee070078d6694e72ed19
SHA1 413c65a1ea00747fadd0d0da36fb23d462b24ff6
SHA256 a45cdb3bc770cc1e1fe8e0c2ee55c13a2959f11cbcfb6a81ddd9e44374408e31
SHA512 c3cdb0a16466e30d3aea6af56d5749f99f7cf6e291543eacc9181a05a302b50f22c0002309c93b372a7f7877b438d9356b7709180bc631527187a783129d84ab

memory/3112-220-0x0000000000400000-0x0000000003118000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 91845a67e9d2b0ad0fe8371b6afd3968
SHA1 1481b7979c069dd8481577eec51006db08b8729c
SHA256 8a39011be11a9b46b7cce4615c4d1a2d24bf73b77c712d02524ce45d198d8d47
SHA512 5eb7646ff63fcb3ec522b288800ef78516f7eb63e4203340049ee484a0fb1728dc3bb8effff4182d28471853da52b7c8ab5303d2f1eec67cd86d26c0d34da1f3

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2436-258-0x0000000000400000-0x0000000003118000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/4876-267-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2436-269-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1544-271-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2436-273-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-277-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1544-279-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2436-281-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-285-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-289-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-293-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-297-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-301-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-305-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-309-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2436-313-0x0000000000400000-0x0000000003118000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 20:03

Reported

2024-04-17 20:06

Platform

win11-20240412-en

Max time kernel

1s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

Signatures

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe

"C:\Users\Admin\AppData\Local\Temp\910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 818adae3-9ab8-4768-8e8f-e42de949bdf7.uuid.createupdate.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 server2.createupdate.org udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.104:443 server2.createupdate.org tcp
US 104.21.94.82:443 carsalessystem.com tcp
US 8.8.8.8:53 82.94.21.104.in-addr.arpa udp
DE 81.3.27.44:3478 stun.ipfire.org udp
BG 185.82.216.104:443 server2.createupdate.org tcp
BG 185.82.216.104:443 server2.createupdate.org tcp
BG 185.82.216.104:443 server2.createupdate.org tcp

Files

memory/560-1-0x0000000004EA0000-0x00000000052A6000-memory.dmp

memory/560-2-0x00000000052B0000-0x0000000005B9B000-memory.dmp

memory/560-3-0x0000000000400000-0x0000000003118000-memory.dmp

memory/580-4-0x00000000026E0000-0x0000000002716000-memory.dmp

memory/580-6-0x0000000004A00000-0x0000000004A10000-memory.dmp

memory/580-5-0x0000000074890000-0x0000000075041000-memory.dmp

memory/580-7-0x0000000004A00000-0x0000000004A10000-memory.dmp

memory/580-8-0x0000000005040000-0x000000000566A000-memory.dmp

memory/580-9-0x0000000004DF0000-0x0000000004E12000-memory.dmp

memory/580-11-0x0000000004F70000-0x0000000004FD6000-memory.dmp

memory/580-10-0x0000000004E90000-0x0000000004EF6000-memory.dmp

memory/580-20-0x00000000056F0000-0x0000000005A47000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yblwb3gh.ptv.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/580-21-0x0000000005BB0000-0x0000000005BCE000-memory.dmp

memory/580-22-0x0000000005C60000-0x0000000005CAC000-memory.dmp

memory/580-23-0x0000000006BC0000-0x0000000006C06000-memory.dmp

memory/580-25-0x0000000006FF0000-0x0000000007024000-memory.dmp

memory/580-36-0x0000000007030000-0x000000000704E000-memory.dmp

memory/580-38-0x0000000004A00000-0x0000000004A10000-memory.dmp

memory/580-37-0x0000000007050000-0x00000000070F4000-memory.dmp

memory/580-27-0x0000000070D70000-0x00000000710C7000-memory.dmp

memory/580-26-0x0000000070B00000-0x0000000070B4C000-memory.dmp

memory/580-24-0x000000007F520000-0x000000007F530000-memory.dmp

memory/580-40-0x0000000007170000-0x000000000718A000-memory.dmp

memory/580-41-0x00000000071B0000-0x00000000071BA000-memory.dmp

memory/580-39-0x00000000077C0000-0x0000000007E3A000-memory.dmp

memory/580-42-0x00000000072C0000-0x0000000007356000-memory.dmp

memory/580-43-0x00000000071E0000-0x00000000071F1000-memory.dmp

memory/580-44-0x0000000007220000-0x000000000722E000-memory.dmp

memory/580-45-0x0000000007230000-0x0000000007245000-memory.dmp

memory/580-46-0x0000000007280000-0x000000000729A000-memory.dmp

memory/580-47-0x00000000072A0000-0x00000000072A8000-memory.dmp

memory/580-50-0x0000000074890000-0x0000000075041000-memory.dmp

memory/4524-52-0x0000000004E20000-0x000000000521F000-memory.dmp

memory/560-53-0x0000000004EA0000-0x00000000052A6000-memory.dmp

memory/1320-59-0x00000000057E0000-0x0000000005B37000-memory.dmp

memory/4524-63-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1320-65-0x00000000048A0000-0x00000000048B0000-memory.dmp

memory/1320-64-0x00000000048A0000-0x00000000048B0000-memory.dmp

memory/560-66-0x00000000052B0000-0x0000000005B9B000-memory.dmp

memory/1320-67-0x0000000074890000-0x0000000075041000-memory.dmp

memory/1320-69-0x0000000070D10000-0x0000000071067000-memory.dmp

memory/1320-68-0x0000000070B00000-0x0000000070B4C000-memory.dmp

memory/1320-78-0x0000000006F10000-0x0000000006FB4000-memory.dmp

memory/560-79-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1320-80-0x00000000048A0000-0x00000000048B0000-memory.dmp

memory/1320-81-0x0000000007260000-0x0000000007271000-memory.dmp

memory/1320-82-0x00000000072B0000-0x00000000072C5000-memory.dmp

memory/1320-85-0x0000000074890000-0x0000000075041000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 d0c46cad6c0778401e21910bd6b56b70
SHA1 7be418951ea96326aca445b8dfe449b2bfa0dca6
SHA256 9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512 057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

memory/3336-87-0x0000000074890000-0x0000000075041000-memory.dmp

memory/3336-89-0x0000000002D80000-0x0000000002D90000-memory.dmp

memory/3336-90-0x0000000005FD0000-0x0000000006327000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7c47102a9b34f4aed10483b25a87714a
SHA1 adc3dd668789ebf22d45b8926f2b6968f74e7eb6
SHA256 b791e4d24d4032971c64e1f082ffd94f424c8454c0b0f0630e8090d00359d1eb
SHA512 0690de1cef6c53a8fd1da2c51ae64ef618a8a917a8f62696f363a19d9922f2ca0986d589c89616989a101b711f8254dc4b0026f82860d6bddf5ce2f41b61344d

memory/3336-88-0x0000000002D80000-0x0000000002D90000-memory.dmp

memory/3336-111-0x0000000002D80000-0x0000000002D90000-memory.dmp

memory/3336-102-0x0000000070D30000-0x0000000071087000-memory.dmp

memory/3336-101-0x0000000070B00000-0x0000000070B4C000-memory.dmp

memory/3336-100-0x000000007F2D0000-0x000000007F2E0000-memory.dmp

memory/3336-113-0x0000000074890000-0x0000000075041000-memory.dmp

memory/3004-116-0x0000000003310000-0x0000000003320000-memory.dmp

memory/3004-117-0x0000000003310000-0x0000000003320000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9995ccd20c142147e71252f772108ab8
SHA1 69f4020afd6c49f59aa07c2553706d3d1ce51c9c
SHA256 37a7125f61c0e8cd12d4ef5a54c06ffa35a8ccfd4f1f43e5383baeded3cc8f6d
SHA512 1adf907e86aec9612a853917dd186b588800525011d5d7a095bedb6bf8c18994f2513494ee382f4762a72dc8b2626d432830e6b853102f990958d8dbe48fdca6

memory/3004-126-0x0000000006330000-0x0000000006687000-memory.dmp

memory/4524-115-0x0000000004E20000-0x000000000521F000-memory.dmp

memory/3004-114-0x0000000074890000-0x0000000075041000-memory.dmp

memory/3004-129-0x0000000070B00000-0x0000000070B4C000-memory.dmp

memory/3004-130-0x0000000070C80000-0x0000000070FD7000-memory.dmp

C:\Windows\rss\csrss.exe

MD5 366d84826a079b4734a8746276b8dd35
SHA1 e9baa1e8612c13ff936948df8e7077d191330453
SHA256 910bb1ec574bfe23e3e3073d8e0580629d6e55fcb5d6c005b742acf6d798d056
SHA512 60f3ee841dfe5a7306903fe3012171e12e30eceac51af2cc7d137d4ade6927b6347368a7082c20a4685fa1ab1071a2a6dc9d0fee6c8e6f96b82c9d3802368e61

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 a78538660f469dd256f2a58afe81026f
SHA1 71b60cdde4616cb25c98c7de5fa1a6e8be92354f
SHA256 0088e31c7711d369904adc9ff3599bbae3e8b1133a31a26784210f7af77367c4
SHA512 56e1eef884cffb3d77fd2307c35cef9a6fe0c350160ac9adabf3d17b8d3eb010fc1007e2fcc63187dce103164fcc077875807d9e84f50f63609a84d85787a36a

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 9dee2cf23c3e10eb7e441c2aa6949ef5
SHA1 54b858616230b8e8d409b3acc46203addf05d6f1
SHA256 c1eb9e2b9ede0fda10b6a4cfd33b023b930c7b01472c5d1900b67ee3ffb7bac0
SHA512 88ddc682b699e2aa7872fd6e183434478b4ce3280c3051e3a09c2ca9c28e1d469b877a286a744224c4697e1d56d45e58813a768d46911af3c28f7ca590c65366

memory/4524-203-0x0000000000400000-0x0000000003118000-memory.dmp

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

MD5 7af2daad658170d0ae895a702e102c52
SHA1 dcb3da69b7ff174767ef4e7bc79eae6e01f559c7
SHA256 669bdfaf55de22854da8b46c2cd43ec4528061c4450d451bf6837420496a4741
SHA512 fe47c187cb11b3a0ecca47e0535e62a505be5d7a1102f5fb6b3843707264eb640b485f783ffe3f7db3564a7382f1b19641a555c0dae7e5dacbd0ecc8a838e2b0

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

MD5 d98e33b66343e7c96158444127a117f6
SHA1 bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA256 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

memory/2012-243-0x0000000000400000-0x0000000003118000-memory.dmp

C:\Windows\windefender.exe

MD5 8e67f58837092385dcf01e8a2b4f5783
SHA1 012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA512 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

memory/1356-251-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2012-254-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1404-256-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2012-258-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-262-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1404-264-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2012-266-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-270-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-274-0x0000000000400000-0x0000000003118000-memory.dmp

memory/1404-276-0x0000000000400000-0x00000000008DF000-memory.dmp

memory/2012-278-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-282-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-286-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-290-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-294-0x0000000000400000-0x0000000003118000-memory.dmp

memory/2012-298-0x0000000000400000-0x0000000003118000-memory.dmp