File name:

4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl

Full analysis: https://app.any.run/tasks/04efd6cb-19ea-47bc-b66b-a6d985b15fe3
Verdict: Malicious activity
Threats:

Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for.

Analysis date: June 21, 2025, 19:34:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
uac
trojan
glupteba
auto-reg
auto-sch
discord
loader
antivm
golang
smoke
smokeloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections
MD5:

3BFFFFDA1E470FEDE020D005D03929DA

SHA1:

42BFFDD24AA6E60B3B0807FF2AA5D321C9E3D9C6

SHA256:

4C4E0C61380662ADC756D147F9C51EAD1D3A6913F49510EAE2766270B778F427

SSDEEP:

98304:XSiyHoNtG1y8ubc3n+pBge1LZBjg2Rn+HTbGrQgo6w6uZmCExT5oAKxkoFxwCqFR:uolf9x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Bypass User Account Control (Modify registry)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
    • Bypass User Account Control (fodhelper)

      • fodhelper.exe (PID: 3820)
      • fodhelper.exe (PID: 6148)
      • fodhelper.exe (PID: 3048)
    • Modifies exclusions in Windows Defender

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
    • Changes the autorun value in the registry

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
    • Glupteba is detected

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
    • Connects to the CnC server

      • csrss.exe (PID: 4372)
    • GLUPTEBA has been detected (SURICATA)

      • csrss.exe (PID: 4372)
    • Application was injected by another process

      • explorer.exe (PID: 4772)
    • Runs injected code in another process

      • toolspub2.exe (PID: 5924)
    • SMOKE has been detected (SURICATA)

      • explorer.exe (PID: 4772)
    • SMOKE mutex has been found

      • explorer.exe (PID: 4772)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
      • aafg31.exe (PID: 6124)
    • Executable content was dropped or overwritten

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
      • explorer.exe (PID: 4772)
    • The process bypasses the loading of PowerShell profile settings

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Starts POWERSHELL.EXE for commands execution

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • The process hides Powershell's copyright startup banner

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Changes default file association

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
    • Starts CMD.EXE for commands execution

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 4372)
    • Application launched itself

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • toolspub2.exe (PID: 2696)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 5628)
    • The process creates files with name similar to system file names

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
    • Starts itself from another location

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
    • There is functionality for VM detection Parallels (YARA)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 5556)
      • csrss.exe (PID: 3760)
    • There is functionality for VM detection VirtualPC (YARA)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • There is functionality for VM detection VirtualBox (YARA)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • There is functionality for VM detection VMWare (YARA)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 5556)
      • csrss.exe (PID: 3760)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 4224)
    • Creates a software uninstall entry

      • csrss.exe (PID: 4372)
    • Creates files in the driver directory

      • csrss.exe (PID: 4372)
    • Windows service management via SC.EXE

      • sc.exe (PID: 1164)
      • sc.exe (PID: 1728)
      • sc.exe (PID: 4864)
    • Drops a system driver (possible attempt to evade defenses)

      • csrss.exe (PID: 4372)
    • Contacting a server suspected of hosting an CnC

      • csrss.exe (PID: 4372)
    • Executes application which crashes

      • toolspub2.exe (PID: 5924)
    • Xmrig is detected

      • csrss.exe (PID: 4372)
  • INFO

    • Checks supported languages

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
      • aafg31.exe (PID: 6124)
      • toolspub2.exe (PID: 2696)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
      • toolspub2.exe (PID: 5924)
    • Reads the computer name

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
      • aafg31.exe (PID: 6124)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 1356)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Process checks computer location settings

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
      • csrss.exe (PID: 4372)
    • Checks proxy server information

      • aafg31.exe (PID: 6124)
      • WerFault.exe (PID: 1896)
      • explorer.exe (PID: 4772)
    • Create files in a temporary directory

      • 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe (PID: 6684)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 3632)
      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 6368)
      • powershell.exe (PID: 3100)
      • powershell.exe (PID: 3580)
      • powershell.exe (PID: 1668)
      • powershell.exe (PID: 1964)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 1944)
      • powershell.exe (PID: 3632)
      • powershell.exe (PID: 4080)
      • powershell.exe (PID: 4868)
      • powershell.exe (PID: 6380)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6368)
      • powershell.exe (PID: 3100)
      • powershell.exe (PID: 3580)
      • powershell.exe (PID: 1668)
      • powershell.exe (PID: 1964)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 1944)
      • powershell.exe (PID: 3632)
      • powershell.exe (PID: 4868)
      • powershell.exe (PID: 4080)
      • powershell.exe (PID: 6380)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6368)
      • powershell.exe (PID: 3100)
      • powershell.exe (PID: 3580)
      • powershell.exe (PID: 1668)
      • powershell.exe (PID: 1964)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 1944)
      • powershell.exe (PID: 3632)
      • powershell.exe (PID: 4080)
      • powershell.exe (PID: 4868)
      • powershell.exe (PID: 6380)
    • Reads security settings of Internet Explorer

      • cmd.exe (PID: 5744)
      • fodhelper.exe (PID: 3820)
      • fodhelper.exe (PID: 6148)
      • cmd.exe (PID: 472)
      • cmd.exe (PID: 1380)
      • fodhelper.exe (PID: 3048)
    • Launching a file from a Registry key

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4372)
    • Manual execution by a user

      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
    • Detects GO elliptic curve encryption (YARA)

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 5556)
    • Application based on Golang

      • 31839b57a4f11171d6abc8bbc4451ee4.exe (PID: 6460)
      • csrss.exe (PID: 4888)
      • csrss.exe (PID: 3388)
      • csrss.exe (PID: 3740)
      • csrss.exe (PID: 6140)
      • csrss.exe (PID: 3760)
      • csrss.exe (PID: 5556)
    • Uses Task Scheduler to autorun other applications (AUTOMATE)

      • csrss.exe (PID: 4372)
    • The sample compiled with english language support

      • csrss.exe (PID: 4372)
    • Reads the software policy settings

      • WerFault.exe (PID: 1896)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 1896)
      • explorer.exe (PID: 4772)
    • Reads the machine GUID from the registry

      • csrss.exe (PID: 4372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 6
CodeSize: 2048
InitializedDataSize: 5443584
UninitializedDataSize: -
EntryPoint: 0x14ad
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
220
Monitored processes
77
Malicious processes
18
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe aafg31.exe no specs toolspub2.exe no specs 31839b57a4f11171d6abc8bbc4451ee4.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe 31839b57a4f11171d6abc8bbc4451ee4.exe no specs powershell.exe no specs conhost.exe no specs #GLUPTEBA 31839b57a4f11171d6abc8bbc4451ee4.exe powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #GLUPTEBA csrss.exe csrss.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe csrss.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs csrss.exe no specs slui.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs mountvol.exe no specs conhost.exe no specs mountvol.exe no specs conhost.exe no specs fodhelper.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs csrss.exe no specs csrss.exe powershell.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs csrss.exe powershell.exe no specs conhost.exe no specs toolspub2.exe werfault.exe #SMOKE explorer.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
472C:\WINDOWS\Sysnative\cmd.exe /C fodhelperC:\Windows\System32\cmd.execsrss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
516schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\WINDOWS\rss\csrss.exe" /TN csrss /FC:\Windows\System32\schtasks.execsrss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\WINDOWS\rss\csrss.exe" /TN csrss /FC:\Windows\System32\schtasks.execsrss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1164sc sdset WinmonProcessMonitor D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)C:\Windows\SysWOW64\sc.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\rpcrt4.dll
1356"C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe" C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\31839b57a4f11171d6abc8bbc4451ee4.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1380C:\WINDOWS\Sysnative\cmd.exe /C fodhelperC:\Windows\System32\cmd.execsrss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1668powershell -nologo -noprofileC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe31839b57a4f11171d6abc8bbc4451ee4.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
Total events
76 920
Read events
76 859
Write events
57
Delete events
4

Modification events

(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(4772) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
4009576800000000
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:OSCaption
Value:
Microsoft Windows 10 Pro
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:OSArchitecture
Value:
64-bit
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:IsAdmin
Value:
1
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:Servers
Value:
https://cdneurops.health
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:UUID
Value:
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:FirstInstallDate
Value:
4809576800000000
(PID) Process:(1356) 31839b57a4f11171d6abc8bbc4451ee4.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96
Operation:writeName:ServiceVersion
Value:
Executable files
8
Suspicious files
5
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
66844c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exeC:\Users\admin\AppData\Local\Temp\aafg31.exeexecutable
MD5:7D1513A2E30FBDD54BAEDF5FCB0E143D
SHA256:07EC937D9091DE355C0B2C788A70E8897CE75EBC162E78D92C94DE5147D5022D
66844c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427rl.exeC:\Users\admin\AppData\Local\Temp\toolspub2.exeexecutable
MD5:A137245D8BC8109C4BC3DF6E2B37D327
SHA256:F342950EA78A3910911DF852DE530912090ACEA09B895E299D4BA0132EE146EE
3100powershell.exeC:\Windows\Temp\__PSScriptPolicyTest_plhoc43p.35a.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6368powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactivebinary
MD5:D1AFE9BF552E0CD437D6D1113D42FD73
SHA256:5B2B5E8CC8F3A695907C2599759FEE9DEDF25A10E5CDC882605914D8F8F090AA
6368powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5gtgr5sy.qqz.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6368powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nugm3mwf.f05.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3100powershell.exeC:\Windows\Temp\__PSScriptPolicyTest_vpb0khob.1p3.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6368powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qgpcd122.tjm.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3100powershell.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactivebinary
MD5:4F68088BFA6AF8500029046EA0948C70
SHA256:B85979BCF44A20CB9023AC8029C20B7B0E417E66405E51ED2FD59D86AAB373E9
3580powershell.exeC:\Windows\Temp\__PSScriptPolicyTest_rlrq1kzy.hzu.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
56
DNS requests
59
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4844
RUXIMICS.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4844
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
400
40.126.32.72:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
200
40.126.32.72:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
16.7 Kb
whitelisted
POST
200
20.190.160.5:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
200
20.190.160.130:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4844
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4844
RUXIMICS.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4844
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
z.nnnaajjjgc.com
malicious
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.133
  • 20.190.160.20
  • 40.126.32.72
  • 20.190.160.17
  • 20.190.160.132
  • 20.190.160.2
  • 20.190.160.65
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com)
4372
csrss.exe
Misc activity
ET INFO Observed Discord Domain (discordapp .com in TLS SNI)
4372
csrss.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Glupteba CnC Domain (cdneurops .health in TLS SNI)
4772
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
4772
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
No debug info