IOC Report
BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\Spirochete204.Myc
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ttdd45s.dxf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n0fvh05u.yf0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\twinsomeness\Chamorro.Saf
data
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\Peripatecically200.par
data
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\blokkryptografimetoderne.une
data
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\bundgrnsens.tan
data
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\handelskamrene.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\huse.got
data
dropped
C:\Users\user\AppData\Local\twinsomeness\Pissoirers\rognfiskenes.sid
data
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\eb42b1a5c308fc11edf1ddbdd25c8486_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\Music\veterinarians.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe
"C:\Users\user\Desktop\BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$unterraced=Get-Content 'C:\Users\user\AppData\Local\twinsomeness\Pissoirers\Spirochete204.Myc';$Lagerekspedient=$unterraced.SubString(66375,3);.$Lagerekspedient($unterraced)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://45.61.136.239/index.php/54596186971079
45.61.136.239
malicious
https://www.google.com
unknown
http://45.61.136.239/index.php/54596186971079qc
unknown
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.coL
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com/
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.110
drive.usercontent.google.com
142.250.185.193

IPs

IP
Domain
Country
Malicious
45.61.136.239
unknown
United States
malicious
142.250.185.193
drive.usercontent.google.com
United States
142.250.186.110
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Pauropod\wohlerite
Gigelira57
HKEY_CURRENT_USER\varmefordelingers\Uninstall\bilder
echinite

Memdumps

Base Address
Regiontype
Protect
Malicious
9A72000
direct allocation
page execute and read and write
malicious
59D5000
heap
page read and write
malicious
30F2000
remote allocation
page execute and read and write
malicious
2114D000
stack
page read and write
788000
unkown
page read and write
88C0000
trusted library allocation
page read and write
8A10000
heap
page read and write
3569000
heap
page read and write
5AA0000
direct allocation
page read and write
536E000
stack
page read and write
98C0000
direct allocation
page execute and read and write
34A4000
trusted library allocation
page read and write
76A0000
heap
page read and write
8E9E000
stack
page read and write
211CF000
stack
page read and write
5835000
heap
page read and write
5AB0000
direct allocation
page read and write
8A8C000
heap
page read and write
75E0000
direct allocation
page read and write
8980000
trusted library allocation
page read and write
7DD000
unkown
page readonly
8897000
stack
page read and write
546E000
stack
page read and write
40A000
unkown
page read and write
8C55000
trusted library allocation
page read and write
2E90000
direct allocation
page read and write
9E7000
heap
page read and write
786000
unkown
page read and write
E01000
unkown
page execute read
5830000
heap
page read and write
6667000
trusted library allocation
page read and write
21040000
remote allocation
page read and write
8AAF000
heap
page read and write
2590000
heap
page read and write
35E0000
heap
page read and write
5A43000
heap
page read and write
5700000
heap
page read and write
2FFC000
stack
page read and write
2D60000
heap
page read and write
7DD000
unkown
page readonly
89C0000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
2107E000
stack
page read and write
5A44000
heap
page read and write
5A44000
heap
page read and write
34D2000
trusted library allocation
page read and write
898D000
trusted library allocation
page read and write
7A9000
unkown
page read and write
7C1D000
heap
page read and write
7F0B000
stack
page read and write
64C9000
trusted library allocation
page read and write
364B000
heap
page read and write
8F30000
heap
page read and write
CEF000
stack
page read and write
75B0000
direct allocation
page read and write
7D7F000
stack
page read and write
7580000
direct allocation
page read and write
2E95000
direct allocation
page read and write
5980000
direct allocation
page read and write
8DDC000
stack
page read and write
34A0000
trusted library allocation
page read and write
7550000
direct allocation
page read and write
7E60000
trusted library allocation
page read and write
354E000
stack
page read and write
8A25000
heap
page read and write
79FE000
stack
page read and write
7A6000
unkown
page read and write
7A32000
heap
page read and write
4F8E000
stack
page read and write
20E1F000
stack
page read and write
34B9000
trusted library allocation
page read and write
4FA0000
heap
page read and write
5A07000
heap
page read and write
54AF000
stack
page read and write
2118E000
stack
page read and write
21040000
remote allocation
page read and write
7C30000
trusted library allocation
page read and write
8E5E000
stack
page read and write
3406000
heap
page read and write
8F50000
trusted library allocation
page execute and read and write
5960000
direct allocation
page read and write
6EE26000
unkown
page readonly
7B3000
unkown
page read and write
4F40000
heap
page execute and read and write
7BA2000
heap
page read and write
21040000
remote allocation
page read and write
960000
heap
page read and write
5A4A000
heap
page read and write
542E000
stack
page read and write
5A4C000
heap
page read and write
59F0000
heap
page read and write
A472000
direct allocation
page execute and read and write
5A00000
heap
page read and write
5617000
trusted library allocation
page read and write
6653000
trusted library allocation
page read and write
79BE000
stack
page read and write
5B4E000
stack
page read and write
20F3F000
stack
page read and write
E00000
unkown
page readonly
408000
unkown
page readonly
81D000
unkown
page readonly
64C1000
trusted library allocation
page read and write
53EE000
stack
page read and write
E07000
unkown
page readonly
7E40000
trusted library allocation
page read and write
5A07000
heap
page read and write
7B49000
heap
page read and write
2570000
heap
page read and write
7B59000
heap
page read and write
8F70000
direct allocation
page execute and read and write
7590000
direct allocation
page read and write
9B8000
heap
page read and write
7BCA000
heap
page read and write
7DA000
unkown
page read and write
8AC6000
heap
page read and write
7C60000
trusted library allocation
page execute and read and write
7BFC000
heap
page read and write
8ADA000
heap
page read and write
4F45000
heap
page execute and read and write
9EB000
heap
page read and write
E05000
unkown
page readonly
35E8000
heap
page read and write
BAF000
stack
page read and write
8A20000
heap
page read and write
7D3E000
stack
page read and write
6EE2D000
unkown
page read and write
7DBE000
stack
page read and write
8F40000
trusted library allocation
page read and write
7C14000
heap
page read and write
210BF000
stack
page read and write
3400000
heap
page read and write
2F40000
remote allocation
page execute and read and write
7C50000
trusted library allocation
page read and write
5A40000
heap
page read and write
7CE0000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
5910000
heap
page readonly
401000
unkown
page execute read
7E20000
trusted library allocation
page read and write
3237000
stack
page read and write
5970000
direct allocation
page read and write
344F000
stack
page read and write
3270000
heap
page read and write
2574000
heap
page read and write
5A00000
heap
page read and write
6EE2F000
unkown
page readonly
54C1000
trusted library allocation
page read and write
AE72000
direct allocation
page execute and read and write
5BCD000
stack
page read and write
7CA0000
trusted library allocation
page read and write
75D0000
direct allocation
page read and write
26D0000
heap
page read and write
5950000
direct allocation
page read and write
81D000
unkown
page readonly
7530000
direct allocation
page read and write
7E50000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
2B5E000
stack
page read and write
2110C000
stack
page read and write
5A4A000
heap
page read and write
88B0000
trusted library allocation
page execute and read and write
20FDE000
stack
page read and write
3508000
heap
page read and write
5A90000
direct allocation
page read and write
7E10000
trusted library allocation
page read and write
5920000
direct allocation
page read and write
B872000
direct allocation
page execute and read and write
7690000
heap
page read and write
40A000
unkown
page write copy
551E000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
20F40000
heap
page read and write
5940000
direct allocation
page read and write
7560000
direct allocation
page read and write
35D0000
trusted library allocation
page execute and read and write
95E000
stack
page read and write
8A00000
trusted library allocation
page read and write
BEE000
stack
page read and write
5AD0000
direct allocation
page read and write
7C90000
trusted library allocation
page read and write
966000
heap
page read and write
7C1A000
heap
page read and write
8990000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
E1D000
unkown
page readonly
3618000
heap
page read and write
5990000
heap
page read and write
7E80000
trusted library allocation
page read and write
400000
unkown
page readonly
7B40000
heap
page read and write
8EDE000
stack
page read and write
7EC0000
trusted library allocation
page read and write
7B30000
heap
page read and write
5A44000
heap
page read and write
8CB0000
trusted library allocation
page execute and read and write
7AD000
unkown
page read and write
75C0000
direct allocation
page read and write
64E9000
trusted library allocation
page read and write
7520000
direct allocation
page read and write
360C000
heap
page read and write
75A0000
direct allocation
page read and write
7540000
direct allocation
page read and write
8A9B000
heap
page read and write
5BE0000
heap
page read and write
4EBC000
stack
page read and write
19A000
stack
page read and write
44F2000
remote allocation
page execute and read and write
98000
stack
page read and write
2B1F000
stack
page read and write
20EFE000
stack
page read and write
7B6D000
heap
page read and write
7CF0000
heap
page execute and read and write
7CB0000
trusted library allocation
page read and write
2E90000
direct allocation
page read and write
2490000
heap
page read and write
7EA0000
trusted library allocation
page read and write
782000
unkown
page read and write
A34000
heap
page read and write
2C5F000
stack
page read and write
8AD2000
heap
page read and write
34D5000
trusted library allocation
page execute and read and write
24EE000
stack
page read and write
9F7000
heap
page read and write
4EF2000
remote allocation
page execute and read and write
33CE000
stack
page read and write
5A04000
heap
page read and write
77C000
unkown
page read and write
5930000
direct allocation
page read and write
7BFE000
heap
page read and write
7DFD000
stack
page read and write
532F000
stack
page read and write
7C37000
trusted library allocation
page read and write
34AD000
trusted library allocation
page execute and read and write
7CC0000
trusted library allocation
page read and write
6528000
trusted library allocation
page read and write
53AE000
stack
page read and write
666C000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
970000
heap
page read and write
3490000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
2595000
heap
page read and write
5B8F000
stack
page read and write
7E00000
trusted library allocation
page read and write
33D0000
heap
page read and write
8A30000
heap
page read and write
8F20000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
20E5D000
stack
page read and write
3550000
heap
page readonly
54B0000
heap
page execute and read and write
36B0000
heap
page read and write
8A71000
heap
page read and write
7CA4000
trusted library allocation
page read and write
34CA000
trusted library allocation
page execute and read and write
892D000
stack
page read and write
5998000
heap
page read and write
7510000
direct allocation
page read and write
8A7D000
heap
page read and write
896E000
stack
page read and write
3470000
trusted library section
page read and write
7BB8000
heap
page read and write
5A5E000
trusted library allocation
page read and write
8F1C000
stack
page read and write
32B0000
heap
page read and write
88A0000
heap
page read and write
5A44000
heap
page read and write
4EFE000
stack
page read and write
5820000
heap
page read and write
401000
unkown
page execute read
7A4000
unkown
page read and write
269F000
stack
page read and write
6EE10000
unkown
page readonly
5A07000
heap
page read and write
7EB0000
trusted library allocation
page read and write
20E9C000
stack
page read and write
400000
unkown
page readonly
253E000
stack
page read and write
6EE11000
unkown
page execute read
8E1C000
stack
page read and write
4FA7000
heap
page read and write
3560000
heap
page read and write
3641000
heap
page read and write
35AF000
stack
page read and write
3480000
trusted library section
page read and write
3450000
heap
page read and write
3AF2000
remote allocation
page execute and read and write
34A3000
trusted library allocation
page execute and read and write
408000
unkown
page readonly
3500000
heap
page read and write
34F0000
trusted library allocation
page read and write
7570000
direct allocation
page read and write
9FD000
heap
page read and write
59F9000
heap
page read and write
5AC0000
direct allocation
page read and write
7E30000
trusted library allocation
page read and write
20F9D000
stack
page read and write
840000
heap
page read and write
7FD60000
trusted library allocation
page execute and read and write
5A40000
heap
page read and write
35B8000
trusted library allocation
page read and write
8970000
heap
page read and write
There are 296 hidden memdumps, click here to show them.