IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:14 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Tmp59F0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp5A01.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
5.42.65.115:40551
malicious
http://tempuri.org/Entity/Id24LR
unknown
http://tempuri.org/Entity/Id22LR
unknown
http://tempuri.org/Entity/Id20LR
unknown
http://tempuri.org/Entity/Id15Responsex
unknown
http://tempuri.org/Entity/Id18Responsex
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id19LR
unknown
http://tempuri.org/Entity/Id17LR
unknown
http://tempuri.org/Entity/Id22Responsex
unknown
http://tempuri.org/Entity/Id15LR
unknown
http://tempuri.org/Entity/Id9LR
unknown
http://tempuri.org/Entity/Id10Responsex
unknown
http://tempuri.org/Entity/Id19Responsex
unknown
http://tempuri.org/Entity/Id13LR
unknown
http://tempuri.org/Entity/Id7LR
unknown
http://tempuri.org/Entity/Id11LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://tempuri.org/Entity/Id1LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id5LR
unknown
http://tempuri.org/Entity/Id3LR
unknown
http://tempuri.org/Entity/Id6Responsex
unknown
http://tempuri.org/Entity/Id7Responsex
unknown
http://tempuri.org/Entity/Id1Responsex
unknown
http://tempuri.org/Entity/Id21Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id23Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id23LR
unknown
http://tempuri.org/Entity/Id21LR
unknown
http://tempuri.org/Entity/Id5Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id14Responsex
unknown
http://tempuri.org/Entity/Id2Responsex
unknown
http://tempuri.org/Entity/Id11Responsex
unknown
http://tempuri.org/Entity/Id20Responsex
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://tempuri.org/Entity/Id8Responsex
unknown
http://tempuri.org/Entity/Id18LR
unknown
http://tempuri.org/Entity/Id13Responsex
unknown
http://tempuri.org/Entity/Id16Responsex
unknown
http://tempuri.org/Entity/Id16LR
unknown
http://tempuri.org/Entity/Id8LR
unknown
http://tempuri.org/Entity/Id14LR
unknown
http://tempuri.org/Entity/Id6LR
unknown
http://tempuri.org/Entity/
unknown
http://tempuri.org/Entity/Id12LR
unknown
http://tempuri.org/Entity/Id9Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Entity/Id10LR
unknown
http://tempuri.org/Entity/Id3Responsex
unknown
http://tempuri.org/Entity/Id4LR
unknown
http://tempuri.org/Entity/Id24Responsex
unknown
http://tempuri.org/Entity/Id2LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id12Responsex
unknown
http://tempuri.org/Entity/Id17Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id4Responsex
unknown
There are 58 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.115
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
517000
unkown
page read and write
malicious
32A1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3060000
heap
page read and write
1438000
heap
page read and write
12D0000
heap
page read and write
6C1B000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
13DD000
trusted library allocation
page execute and read and write
7EEE0000
trusted library allocation
page execute and read and write
6C50000
trusted library allocation
page read and write
D60000
heap
page read and write
3285000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
347D000
trusted library allocation
page read and write
6BE5000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
6C3E000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
55A000
unkown
page read and write
4F0000
unkown
page readonly
6BE9000
trusted library allocation
page read and write
13ED000
trusted library allocation
page execute and read and write
6C41000
trusted library allocation
page read and write
566000
unkown
page readonly
7E0000
heap
page read and write
6E90000
trusted library allocation
page read and write
4F0000
unkown
page readonly
160B000
trusted library allocation
page execute and read and write
4F1000
unkown
page execute read
54B000
unkown
page read and write
301E000
stack
page read and write
5832000
trusted library allocation
page read and write
6A3E000
stack
page read and write
6C90000
trusted library allocation
page read and write
6C6E000
trusted library allocation
page read and write
653E000
stack
page read and write
5840000
trusted library allocation
page execute and read and write
5A40000
heap
page read and write
50D000
unkown
page readonly
693E000
stack
page read and write
7F0000
direct allocation
page execute and read and write
5750000
heap
page read and write
325E000
stack
page read and write
13E0000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
1675000
heap
page read and write
55FE000
trusted library allocation
page read and write
E10000
heap
page read and write
564E000
trusted library allocation
page read and write
5753000
heap
page read and write
14FE000
heap
page read and write
6A50000
trusted library allocation
page read and write
13FA000
trusted library allocation
page execute and read and write
55E4000
trusted library allocation
page read and write
140B000
heap
page read and write
5612000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
50D000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
6BE7000
trusted library allocation
page read and write
108A000
stack
page read and write
5D00000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
3290000
heap
page execute and read and write
6BE0000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
5A9A000
heap
page read and write
6D00000
trusted library allocation
page execute and read and write
6C26000
trusted library allocation
page read and write
C4E000
stack
page read and write
13F6000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
13F0000
trusted library allocation
page read and write
77D000
stack
page read and write
13D3000
trusted library allocation
page execute and read and write
5820000
heap
page read and write
5601000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1187000
stack
page read and write
1607000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
6BD0000
trusted library allocation
page read and write
14D0000
heap
page read and write
5930000
heap
page execute and read and write
3260000
trusted library allocation
page read and write
6B00000
trusted library allocation
page execute and read and write
64BE000
stack
page read and write
5AE3000
heap
page read and write
30B0000
heap
page read and write
1670000
heap
page read and write
55E6000
trusted library allocation
page read and write
3080000
trusted library allocation
page execute and read and write
3090000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
68FF000
stack
page read and write
62D2000
heap
page read and write
517000
unkown
page write copy
446000
remote allocation
page execute and read and write
5CE0000
heap
page read and write
1605000
trusted library allocation
page execute and read and write
1600000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
560D000
trusted library allocation
page read and write
1380000
heap
page read and write
13E3000
trusted library allocation
page read and write
1445000
heap
page read and write
5D08000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
5A82000
heap
page read and write
E1A000
heap
page read and write
6C60000
trusted library allocation
page read and write
166E000
stack
page read and write
C8E000
stack
page read and write
6EB0000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
6C32000
trusted library allocation
page read and write
6C4A000
trusted library allocation
page read and write
6D70000
trusted library allocation
page execute and read and write
42C2000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
42A1000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
1400000
heap
page read and write
3280000
trusted library allocation
page read and write
CF0000
heap
page read and write
6EC0000
heap
page execute and read and write
6C80000
trusted library allocation
page read and write
6BD8000
trusted library allocation
page read and write
13F2000
trusted library allocation
page read and write
6BD5000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
1320000
heap
page read and write
3278000
trusted library allocation
page read and write
110F000
stack
page read and write
437000
remote allocation
page execute and read and write
5CBE000
stack
page read and write
13D4000
trusted library allocation
page read and write
E1E000
heap
page read and write
5920000
heap
page read and write
4F1000
unkown
page execute read
6C10000
trusted library allocation
page read and write
1602000
trusted library allocation
page read and write
149D000
heap
page read and write
1325000
heap
page read and write
305D000
stack
page read and write
6C6B000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
566000
unkown
page readonly
5A54000
heap
page read and write
6C65000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
AFD000
stack
page read and write
6BDB000
trusted library allocation
page read and write
14B9000
heap
page read and write
34CC000
trusted library allocation
page read and write
6D60000
trusted library allocation
page execute and read and write
6C21000
trusted library allocation
page read and write
100F000
stack
page read and write
There are 159 hidden memdumps, click here to show them.