IOC Report
Amended Order #60-230958400.exe

loading gif

Files

File Path
Type
Category
Malicious
Amended Order #60-230958400.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp61BF.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BKTxiN.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Amended Order #60-230958400.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BKTxiN.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_alvetql5.tsi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c0lcoygy.c0y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_daaihad3.ti1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hoyj4dd0.klh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rptktlxf.sri.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbjvb5s3.fgw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v12ffaa0.wy1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzvsikpm.fdb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6FE8.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\BKTxiN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Amended Order #60-230958400.exe
"C:\Users\user\Desktop\Amended Order #60-230958400.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Amended Order #60-230958400.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\BKTxiN.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BKTxiN" /XML "C:\Users\user\AppData\Local\Temp\tmp61BF.tmp"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
malicious
C:\Users\user\AppData\Roaming\BKTxiN.exe
C:\Users\user\AppData\Roaming\BKTxiN.exe
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BKTxiN" /XML "C:\Users\user\AppData\Local\Temp\tmp6FE8.tmp"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7572 -s 12
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7956 -s 12
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://feeds.soundcloud.com/users/soundcloud:users:38128127/sounds.rss
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
56.126.166.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
15992000
trusted library allocation
page read and write
malicious
14007000
trusted library allocation
page read and write
malicious
A51E079000
stack
page read and write
A51E0FF000
unkown
page read and write
1E530000
trusted library section
page read and write
3DF2000
trusted library allocation
page read and write
7FFD9B90D000
trusted library allocation
page execute and read and write
1E9E000
stack
page read and write
13EED000
trusted library allocation
page read and write
1F199750000
heap
page read and write
BF0000
unkown
page readonly
7FFD9B8F0000
trusted library allocation
page read and write
1550000
heap
page read and write
1F7E0000
heap
page read and write
7FFD9B91D000
trusted library allocation
page execute and read and write
76267F000
unkown
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
1C49C000
stack
page read and write
3780000
heap
page read and write
7626FE000
stack
page read and write
1F199775000
heap
page read and write
1844000
trusted library section
page readonly
170C000
heap
page read and write
2083E000
stack
page read and write
38A0000
heap
page execute and read and write
1543000
heap
page read and write
1F199788000
heap
page read and write
140E1000
trusted library allocation
page read and write
38B0000
trusted library section
page read and write
214DE000
stack
page read and write
1DD90000
trusted library allocation
page read and write
1850000
heap
page read and write
1F7FC000
heap
page read and write
13FD8000
trusted library allocation
page read and write
1450000
heap
page read and write
EF0000
heap
page read and write
762399000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
13D19000
trusted library allocation
page read and write
1ED7EAC0000
heap
page read and write
7FFD9B94C000
trusted library allocation
page execute and read and write
2183E000
stack
page read and write
3CF1000
trusted library allocation
page read and write
1600000
heap
page read and write
7FFD9B94C000
trusted library allocation
page execute and read and write
7FFD9B9A6000
trusted library allocation
page read and write
1C81B000
heap
page read and write
13E03000
trusted library allocation
page read and write
13D01000
trusted library allocation
page read and write
1ED7EB30000
heap
page read and write
1CB75000
heap
page read and write
1ED7EB80000
heap
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
15A0000
heap
page read and write
15962000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
17F0000
heap
page execute and read and write
7FFD9BA99000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1C8E0000
heap
page read and write
13F1D000
trusted library allocation
page read and write
2243B000
stack
page read and write
15E1000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
FD0000
heap
page read and write
1F81D000
heap
page read and write
3890000
trusted library section
page read and write
7FFD9BAD7000
trusted library allocation
page read and write
16AC000
heap
page read and write
7FFD9B914000
trusted library allocation
page read and write
1DDB2000
trusted library allocation
page read and write
1D4E000
stack
page read and write
3CEE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
160F000
heap
page read and write
15F2000
stack
page read and write
13CF8000
trusted library allocation
page read and write
7FFD9BA1F000
trusted library allocation
page execute and read and write
1ED7EB89000
heap
page read and write
417F000
trusted library allocation
page read and write
21C3E000
stack
page read and write
1945000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1F199770000
heap
page read and write
4181000
trusted library allocation
page read and write
1406B000
trusted library allocation
page read and write
3910000
heap
page execute and read and write
3770000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
210DD000
stack
page read and write
1711000
heap
page read and write
1ED7EB35000
heap
page read and write
15D0000
heap
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
140A6000
trusted library allocation
page read and write
214F000
stack
page read and write
1FA60000
heap
page read and write
415A000
trusted library allocation
page read and write
4F3ADFC000
stack
page read and write
18C5000
heap
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
160D000
heap
page read and write
14C5000
heap
page read and write
1570000
trusted library section
page readonly
1CB70000
heap
page read and write
13FF0000
trusted library allocation
page read and write
2143E000
stack
page read and write
1820000
heap
page read and write
15E4000
heap
page read and write
7FFD9B9D6000
trusted library allocation
page execute and read and write
1940000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
13E33000
trusted library allocation
page read and write
170A000
heap
page read and write
7FFD9B9AC000
trusted library allocation
page execute and read and write
A51E17F000
stack
page read and write
1C980000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
13D31000
trusted library allocation
page read and write
415C000
trusted library allocation
page read and write
1781000
heap
page read and write
7FFD9B8F3000
trusted library allocation
page execute and read and write
1CD8D000
stack
page read and write
1723000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
41A6000
trusted library allocation
page read and write
7FFD9B908000
trusted library allocation
page read and write
7FFD9B8F4000
trusted library allocation
page read and write
17D0000
heap
page read and write
1792000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
1615000
heap
page read and write
208DE000
stack
page read and write
204DF000
stack
page read and write
140E7000
trusted library allocation
page read and write
1C80B000
heap
page read and write
7FFD9B914000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
15A6000
heap
page read and write
1620000
heap
page read and write
7FFD9B8F4000
trusted library allocation
page read and write
7FFD9BA97000
trusted library allocation
page read and write
1FAA6000
heap
page read and write
1DF80000
heap
page read and write
16A0000
heap
page read and write
BF2000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
2043F000
stack
page read and write
7FFD9B9D6000
trusted library allocation
page execute and read and write
1C57C000
stack
page read and write
1C9D0000
heap
page read and write
3E49000
trusted library allocation
page read and write
417D000
trusted library allocation
page read and write
13F73000
trusted library allocation
page read and write
1F841000
heap
page read and write
18B0000
heap
page execute and read and write
16E2000
heap
page read and write
170E000
heap
page read and write
41A9000
trusted library allocation
page read and write
1F199670000
heap
page read and write
4176000
trusted library allocation
page read and write
2003E000
stack
page read and write
13F2000
stack
page read and write
14A0000
trusted library allocation
page read and write
3D1F000
stack
page read and write
16A6000
heap
page read and write
1C84A000
heap
page read and write
7FFD9B90D000
trusted library allocation
page execute and read and write
1840000
trusted library section
page readonly
1CF7D000
stack
page read and write
1C9C0000
heap
page read and write
1823000
heap
page read and write
7FFD9B8FD000
trusted library allocation
page execute and read and write
41CC000
trusted library allocation
page read and write
1540000
heap
page read and write
1F199880000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1C9B0000
heap
page read and write
1FAA4000
heap
page read and write
7FFD9B90C000
trusted library allocation
page read and write
3DBB000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1C7E0000
heap
page read and write
41FC000
trusted library allocation
page read and write
3E00000
trusted library allocation
page read and write
7FFD9BA13000
trusted library allocation
page execute and read and write
20C3F000
stack
page read and write
200DE000
stack
page read and write
3D21000
trusted library allocation
page read and write
2103B000
stack
page read and write
1686000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1440000
heap
page read and write
1ED7EAE0000
heap
page read and write
415E000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
4183000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
1FA8B000
heap
page read and write
15CD000
heap
page read and write
1A9E000
stack
page read and write
1890000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
15AC000
heap
page read and write
1BD50000
trusted library allocation
page read and write
1FCDD000
stack
page read and write
D20000
heap
page read and write
21CDF000
stack
page read and write
FE87DFC000
stack
page read and write
13D21000
trusted library allocation
page read and write
1BD20000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
7FFD9B8FD000
trusted library allocation
page execute and read and write
1C7F0000
heap
page read and write
7FFD9B8F3000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
13D28000
trusted library allocation
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
1F199780000
heap
page read and write
1800000
heap
page read and write
2203F000
stack
page read and write
13CF1000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
1420000
heap
page read and write
1445000
heap
page read and write
1C8E5000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9BADA000
trusted library allocation
page read and write
417B000
trusted library allocation
page read and write
1ED7EAB0000
heap
page read and write
4185000
trusted library allocation
page read and write
1E190000
heap
page read and write
7FF4D2E40000
trusted library allocation
page execute and read and write
218DB000
stack
page read and write
16CA000
heap
page read and write
14162000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
1580000
heap
page read and write
20CDB000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
18C0000
heap
page read and write
1400000
heap
page read and write
3E02000
trusted library allocation
page read and write
There are 238 hidden memdumps, click here to show them.