Analysis Overview
SHA256
2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62
Threat Level: Known bad
The file 2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62 was found to be: Known bad.
Malicious Activity Summary
Glupteba
Glupteba payload
Modifies boot configuration data using bcdedit
Modifies Windows Firewall
Possible attempt to disable PatchGuard
UPX packed file
Launches sc.exe
Command and Scripting Interpreter: PowerShell
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-16 22:50
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-16 22:49
Reported
2024-05-16 22:55
Platform
win7-20240221-en
Max time kernel
2s
Max time network
288s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies boot configuration data using bcdedit
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Possible attempt to disable PatchGuard
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
| Token: SeImpersonatePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe
"C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe"
C:\Windows\system32\makecab.exe
"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240516225004.log C:\Windows\Logs\CBS\CbsPersist_20240516225004.cab
C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe
"C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe"
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\system32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\system32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -timeout 0
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
C:\Windows\system32\bcdedit.exe
C:\Windows\Sysnative\bcdedit.exe /v
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
C:\Windows\system32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | b972d238-0342-4aac-9bd0-aacdbaf5e7c7.uuid.statstraffic.org | udp |
| US | 8.8.8.8:53 | msdl.microsoft.com | udp |
| US | 204.79.197.219:443 | msdl.microsoft.com | tcp |
| US | 8.8.8.8:53 | vsblobprodscussu5shard30.blob.core.windows.net | udp |
| US | 20.150.70.36:443 | vsblobprodscussu5shard30.blob.core.windows.net | tcp |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | vsblobprodscussu5shard20.blob.core.windows.net | udp |
| US | 20.150.38.228:443 | vsblobprodscussu5shard20.blob.core.windows.net | tcp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | server15.statstraffic.org | udp |
| US | 8.8.8.8:53 | stun1.l.google.com | udp |
| US | 162.159.135.233:443 | cdn.discordapp.com | tcp |
| BG | 185.82.216.104:443 | server15.statstraffic.org | tcp |
| US | 74.125.250.129:19302 | stun1.l.google.com | udp |
| US | 8.8.8.8:53 | carsalessystem.com | udp |
| US | 172.67.221.71:443 | carsalessystem.com | tcp |
| BG | 185.82.216.104:443 | server15.statstraffic.org | tcp |
| BG | 185.82.216.104:443 | server15.statstraffic.org | tcp |
| BG | 185.82.216.104:443 | server15.statstraffic.org | tcp |
Files
memory/2012-0-0x0000000004360000-0x0000000004758000-memory.dmp
memory/2012-1-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2012-2-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2012-3-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2012-6-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/3040-5-0x0000000004530000-0x0000000004928000-memory.dmp
C:\Windows\rss\csrss.exe
| MD5 | 1157922d694e53092c8c05331878f8a1 |
| SHA1 | f63cbc1b6e261bd011352c0f64ec6238ec37c397 |
| SHA256 | 2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62 |
| SHA512 | 35d95d7672a2f3f1796317d3b455bc6575e997ce67c049a4ccc0971a8066820df1f0e069b9a1e07e615cf87685fdd0518859d4769f132f02fe38dfe534118ed1 |
memory/3040-15-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-16-0x00000000043C0000-0x00000000047B8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
| MD5 | 13aaafe14eb60d6a718230e82c671d57 |
| SHA1 | e039dd924d12f264521b8e689426fb7ca95a0a7b |
| SHA256 | f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3 |
| SHA512 | ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3 |
\Users\Admin\AppData\Local\Temp\symsrv.dll
| MD5 | 5c399d34d8dc01741269ff1f1aca7554 |
| SHA1 | e0ceed500d3cef5558f3f55d33ba9c3a709e8f55 |
| SHA256 | e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f |
| SHA512 | 8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d |
\Users\Admin\AppData\Local\Temp\dbghelp.dll
| MD5 | f0616fa8bc54ece07e3107057f74e4db |
| SHA1 | b33995c4f9a004b7d806c4bb36040ee844781fca |
| SHA256 | 6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026 |
| SHA512 | 15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c |
C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
| MD5 | 1afff8d5352aecef2ecd47ffa02d7f7d |
| SHA1 | 8b115b84efdb3a1b87f750d35822b2609e665bef |
| SHA256 | c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1 |
| SHA512 | e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb |
memory/2648-37-0x0000000140000000-0x00000001405E8000-memory.dmp
memory/2648-29-0x0000000140000000-0x00000001405E8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
| MD5 | d98e33b66343e7c96158444127a117f6 |
| SHA1 | bb716c5509a2bf345c6c1152f6e3e1452d39d50d |
| SHA256 | 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1 |
| SHA512 | 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5 |
C:\Users\Admin\AppData\Local\Temp\Cab3BCA.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 29f65ba8e88c063813cc50a4ea544e93 |
| SHA1 | 05a7040d5c127e68c25d81cc51271ffb8bef3568 |
| SHA256 | 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184 |
| SHA512 | e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa |
C:\Users\Admin\AppData\Local\Temp\Tar3CEA.tmp
| MD5 | 435a9ac180383f9fa094131b173a2f7b |
| SHA1 | 76944ea657a9db94f9a4bef38f88c46ed4166983 |
| SHA256 | 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34 |
| SHA512 | 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a |
memory/2380-97-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-109-0x0000000000400000-0x0000000002B0C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
| MD5 | fd2727132edd0b59fa33733daa11d9ef |
| SHA1 | 63e36198d90c4c2b9b09dd6786b82aba5f03d29a |
| SHA256 | 3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e |
| SHA512 | 3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e |
\Users\Admin\AppData\Local\Temp\osloader.exe
| MD5 | e2f68dc7fbd6e0bf031ca3809a739346 |
| SHA1 | 9c35494898e65c8a62887f28e04c0359ab6f63f5 |
| SHA256 | b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4 |
| SHA512 | 26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579 |
memory/2380-115-0x0000000000400000-0x0000000002B0C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
| MD5 | fafbf2197151d5ce947872a4b0bcbe16 |
| SHA1 | a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020 |
| SHA256 | feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71 |
| SHA512 | acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6 |
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
| MD5 | d98e78fd57db58a11f880b45bb659767 |
| SHA1 | ab70c0d3bd9103c07632eeecee9f51d198ed0e76 |
| SHA256 | 414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0 |
| SHA512 | aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831 |
memory/2380-142-0x0000000000400000-0x0000000002B0C000-memory.dmp
C:\Windows\windefender.exe
| MD5 | 8e67f58837092385dcf01e8a2b4f5783 |
| SHA1 | 012c49cfd8c5d06795a6f67ea2baf2a082cf8625 |
| SHA256 | 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa |
| SHA512 | 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec |
memory/2752-146-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/2752-151-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/1188-150-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/2380-152-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/1188-153-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/2380-154-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-156-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/1188-157-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/2380-158-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-160-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-162-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-164-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-166-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-168-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-170-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-172-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-174-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-176-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-178-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-180-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-182-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-184-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-186-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-188-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-190-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-192-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-194-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-196-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-198-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/2380-200-0x0000000000400000-0x0000000002B0C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-16 22:49
Reported
2024-05-16 22:55
Platform
win10-20240404-en
Max time kernel
8s
Max time network
294s
Command Line
Signatures
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe
"C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe
"C:\Users\Admin\AppData\Local\Temp\2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\System32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 982fa6eb-833b-4e9a-8ff1-f25e51d5a248.uuid.statstraffic.org | udp |
| US | 8.8.8.8:53 | server4.statstraffic.org | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | stun4.l.google.com | udp |
| US | 162.159.130.233:443 | cdn.discordapp.com | tcp |
| US | 74.125.250.129:19302 | stun4.l.google.com | udp |
| BG | 185.82.216.104:443 | server4.statstraffic.org | tcp |
| US | 8.8.8.8:53 | carsalessystem.com | udp |
| US | 172.67.221.71:443 | carsalessystem.com | tcp |
| US | 8.8.8.8:53 | 129.250.125.74.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.216.82.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 233.130.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| BG | 185.82.216.104:443 | server4.statstraffic.org | tcp |
| US | 8.8.8.8:53 | 170.117.168.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| BG | 185.82.216.104:443 | server4.statstraffic.org | tcp |
| BG | 185.82.216.104:443 | server4.statstraffic.org | tcp |
Files
memory/4412-1-0x00000000048C0000-0x0000000004CBB000-memory.dmp
memory/4412-2-0x0000000004CC0000-0x00000000055AB000-memory.dmp
memory/4412-3-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4608-6-0x000000007302E000-0x000000007302F000-memory.dmp
memory/4608-7-0x0000000006D50000-0x0000000006D86000-memory.dmp
memory/4608-9-0x0000000007500000-0x0000000007B28000-memory.dmp
memory/4608-10-0x0000000073020000-0x000000007370E000-memory.dmp
memory/4608-8-0x0000000073020000-0x000000007370E000-memory.dmp
memory/4608-13-0x0000000007D80000-0x0000000007DE6000-memory.dmp
memory/4608-12-0x0000000007C10000-0x0000000007C76000-memory.dmp
memory/4608-11-0x0000000007440000-0x0000000007462000-memory.dmp
memory/4608-14-0x0000000007DF0000-0x0000000008140000-memory.dmp
memory/4608-15-0x00000000081E0000-0x00000000081FC000-memory.dmp
memory/4608-16-0x0000000008210000-0x000000000825B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ptroh5g.lrt.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
memory/4608-35-0x00000000087A0000-0x00000000087DC000-memory.dmp
memory/4608-66-0x0000000009310000-0x0000000009386000-memory.dmp
memory/4608-74-0x000000006FD30000-0x000000006FD7B000-memory.dmp
memory/4608-81-0x000000000A1C0000-0x000000000A265000-memory.dmp
memory/4608-76-0x000000000A160000-0x000000000A17E000-memory.dmp
memory/4608-75-0x000000006FD80000-0x00000000700D0000-memory.dmp
memory/4608-73-0x000000000A180000-0x000000000A1B3000-memory.dmp
memory/4608-82-0x000000000A3A0000-0x000000000A434000-memory.dmp
memory/4608-275-0x000000000A340000-0x000000000A35A000-memory.dmp
memory/4608-280-0x000000000A330000-0x000000000A338000-memory.dmp
memory/4412-297-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/4608-299-0x0000000073020000-0x000000007370E000-memory.dmp
memory/4412-301-0x0000000000400000-0x0000000000D1C000-memory.dmp
memory/4412-302-0x0000000004CC0000-0x00000000055AB000-memory.dmp
memory/4412-300-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/528-306-0x0000000007640000-0x0000000007990000-memory.dmp
memory/528-307-0x0000000007A60000-0x0000000007AAB000-memory.dmp
memory/528-332-0x0000000008FA0000-0x0000000009045000-memory.dmp
memory/528-327-0x000000006FEA0000-0x00000000701F0000-memory.dmp
memory/528-326-0x000000006FE50000-0x000000006FE9B000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 1c19c16e21c97ed42d5beabc93391fc5 |
| SHA1 | 8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68 |
| SHA256 | 1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05 |
| SHA512 | 7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 2f2e659d77b5e9be09d1355ec4da150c |
| SHA1 | a4ca435eda9a7773db257db8c92167dac52e0568 |
| SHA256 | 4081ae51d3dedfce5fe61cc4a01eb8f7c52d517291010c42c9549a25680303f8 |
| SHA512 | 6b7a0e21ee1d16c7f778b656ea38f79f7de9b52b3343bd4c4b1a01cac3c6dd4e9c9890719b1edfd0d7cc1fd8cbd5a63ba7580b1fb335c7f60829e8c3e56d4a27 |
memory/4040-542-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/3100-566-0x000000006FEA0000-0x00000000701F0000-memory.dmp
memory/3100-565-0x000000006FE50000-0x000000006FE9B000-memory.dmp
memory/5036-781-0x0000000007B20000-0x0000000007E70000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | a214d9b82caf8ecb2af33df426485cf8 |
| SHA1 | 39a21f87992ce0d0d4fbfb34923550aa8207d6c5 |
| SHA256 | 0022b6f9093bdd5b0f3377ba8c74f75c01280712a48a11fe32957c4b04591761 |
| SHA512 | 753c162d7d634c3657b96b35e039373ea8258d96b65ed2f0df94c3e53bb92924c49cb9f44d6dee4aaffa3bd2d3319c07c6670105b952a95c4aaa3c6c3b22ce29 |
memory/5036-801-0x000000006FE50000-0x000000006FE9B000-memory.dmp
memory/5036-802-0x000000006FEC0000-0x0000000070210000-memory.dmp
C:\Windows\rss\csrss.exe
| MD5 | 1157922d694e53092c8c05331878f8a1 |
| SHA1 | f63cbc1b6e261bd011352c0f64ec6238ec37c397 |
| SHA256 | 2546c196a3636ae61a971fd718a9feff3dd2b137ab96fc5f256f111b165cbf62 |
| SHA512 | 35d95d7672a2f3f1796317d3b455bc6575e997ce67c049a4ccc0971a8066820df1f0e069b9a1e07e615cf87685fdd0518859d4769f132f02fe38dfe534118ed1 |
memory/4040-1018-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/32-1023-0x00000000078B0000-0x0000000007C00000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | eca46bf53ca234f3b6ea5b9ede0ab116 |
| SHA1 | a0617be1d4c62b4bf1489e9b73b45af6c52a640c |
| SHA256 | 612f7c79b602a59cb127487a67c4fa7fe8b62f7232beb3491ac5a50bd5cefa51 |
| SHA512 | 9a0db634ae52fb4ee22f6941b6d85f8ee8fa582d082450746c44ed40664790caad647bed27fbe631b6fd0098fba8082ef33d83df9f99ac7a62f612aab4dab119 |
memory/32-1025-0x0000000007D20000-0x0000000007D6B000-memory.dmp
memory/32-1045-0x000000006FE00000-0x0000000070150000-memory.dmp
memory/32-1044-0x000000006FDB0000-0x000000006FDFB000-memory.dmp
memory/32-1050-0x0000000009290000-0x0000000009335000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 43aab291852c6342774aaa9c29acf9f5 |
| SHA1 | 452a03fdbd7fdfa03bf9b4bf9c778fb6390d8fba |
| SHA256 | 53060117bbecbaa672772b7ecac6df904c732036196f88667c03292629cb2216 |
| SHA512 | dc3b9f98e827f2cdfe3c2a0919e70482cab34663bbc966a1f03cc31f31c2cad0b999c07f064a95c141afe1fbd02c22df380c0f1f434615c093f324e6b6788af3 |
memory/4136-1261-0x0000000008110000-0x0000000008460000-memory.dmp
memory/4136-1263-0x0000000008C40000-0x0000000008C8B000-memory.dmp
memory/4136-1282-0x000000006FD00000-0x000000006FD4B000-memory.dmp
memory/4136-1283-0x000000006FD70000-0x00000000700C0000-memory.dmp
memory/4136-1288-0x0000000009DD0000-0x0000000009E75000-memory.dmp
memory/1928-1500-0x0000000008420000-0x0000000008770000-memory.dmp
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | f90062e172378ae315854f03f890432e |
| SHA1 | 2d0af8ee083b491c1b4e7533a9e2a254cc6c486b |
| SHA256 | 60100ca05c216f7683132b05a635dbeb5cc68b307dd4a5696a4ac27d7e6511ed |
| SHA512 | ca738fd9f8b6b0ea3263d8cdfc06ba18d5878ebe278a2bbd2844df4e4e46f77801238b635748ce925e729dc4fc453933510927f4304f8819ebb9ec9b6bf9a37b |
memory/880-1499-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/1928-1521-0x000000006FD50000-0x00000000700A0000-memory.dmp
memory/1928-1520-0x000000006FD00000-0x000000006FD4B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
| MD5 | d98e33b66343e7c96158444127a117f6 |
| SHA1 | bb716c5509a2bf345c6c1152f6e3e1452d39d50d |
| SHA256 | 5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1 |
| SHA512 | 705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5 |
memory/880-1739-0x0000000000400000-0x0000000002B0C000-memory.dmp
C:\Windows\windefender.exe
| MD5 | 8e67f58837092385dcf01e8a2b4f5783 |
| SHA1 | 012c49cfd8c5d06795a6f67ea2baf2a082cf8625 |
| SHA256 | 166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa |
| SHA512 | 40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec |
memory/2676-1744-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/720-1747-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/2676-1746-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/880-1748-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/720-1749-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/880-1750-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1752-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/720-1753-0x0000000000400000-0x00000000008DF000-memory.dmp
memory/880-1754-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1756-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1758-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1760-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1762-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1764-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1766-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1768-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1770-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1772-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1774-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1776-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1778-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1780-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1782-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1784-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1786-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1788-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1790-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1792-0x0000000000400000-0x0000000002B0C000-memory.dmp
memory/880-1794-0x0000000000400000-0x0000000002B0C000-memory.dmp