IOC Report
rnoahcrypter.exe

loading gif

Files

File Path
Type
Category
Malicious
rnoahcrypter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut21A8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut2216.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\derogates
data
dropped
C:\Users\user\AppData\Local\Temp\nonplacental
ASCII text, with very long lines (28756), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rnoahcrypter.exe
"C:\Users\user\Desktop\rnoahcrypter.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\rnoahcrypter.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://mail.magna.com.pk
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ocsp.c)
unknown
http://crl.co
unknown

Domains

Name
IP
Malicious
mail.magna.com.pk
164.68.127.9
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
164.68.127.9
mail.magna.com.pk
Germany
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB0000
trusted library section
page read and write
malicious
28DF000
heap
page read and write
malicious
3D61000
trusted library allocation
page read and write
malicious
2DDF000
trusted library allocation
page read and write
malicious
51A0000
trusted library section
page read and write
malicious
2DB4000
trusted library allocation
page read and write
malicious
2DE7000
trusted library allocation
page read and write
malicious
2DF2000
trusted library allocation
page read and write
malicious
4253000
direct allocation
page read and write
2765000
trusted library allocation
page execute and read and write
65D0000
trusted library allocation
page execute and read and write
15DB000
stack
page read and write
43FD000
direct allocation
page read and write
E3F000
unkown
page write copy
19DB000
heap
page read and write
6A90000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
65B8000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
4253000
direct allocation
page read and write
662E000
stack
page read and write
2B60000
heap
page read and write
446E000
direct allocation
page read and write
5240000
heap
page read and write
43F9000
direct allocation
page read and write
D80000
unkown
page readonly
2D2D000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
1A19000
heap
page read and write
CF1000
heap
page read and write
55DE000
stack
page read and write
51F0000
heap
page execute and read and write
1919000
heap
page read and write
547C000
stack
page read and write
4130000
direct allocation
page read and write
2D61000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
18F1000
heap
page read and write
28A0000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
42D0000
direct allocation
page read and write
3E23000
trusted library allocation
page read and write
445000
system
page execute and read and write
C70000
trusted library section
page read and write
1A2A000
heap
page read and write
43F9000
direct allocation
page read and write
2733000
trusted library allocation
page execute and read and write
3DE0000
heap
page read and write
2D26000
trusted library allocation
page read and write
190D000
heap
page read and write
19D1000
heap
page read and write
54A0000
heap
page read and write
56DE000
stack
page read and write
2D1A000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
400000
system
page execute and read and write
2ABE000
stack
page read and write
1919000
heap
page read and write
43F9000
direct allocation
page read and write
61A0000
heap
page read and write
1870000
heap
page read and write
FF0000
heap
page read and write
19FA000
heap
page read and write
17B0000
heap
page read and write
170D000
stack
page read and write
1919000
heap
page read and write
E0F000
unkown
page readonly
2730000
trusted library allocation
page read and write
7F280000
trusted library allocation
page execute and read and write
2D00000
trusted library allocation
page read and write
647E000
stack
page read and write
1919000
heap
page read and write
2760000
trusted library allocation
page read and write
D81000
unkown
page execute read
7C0000
heap
page read and write
42D0000
direct allocation
page read and write
3E61000
trusted library allocation
page read and write
43F9000
direct allocation
page read and write
CCB000
heap
page read and write
1A19000
heap
page read and write
282C000
stack
page read and write
4130000
direct allocation
page read and write
643E000
stack
page read and write
27E3000
heap
page read and write
2D21000
trusted library allocation
page read and write
18B2000
heap
page read and write
D81000
unkown
page execute read
276B000
trusted library allocation
page execute and read and write
E48000
unkown
page readonly
4253000
direct allocation
page read and write
43FD000
direct allocation
page read and write
42D0000
direct allocation
page read and write
54E2000
heap
page read and write
275A000
trusted library allocation
page execute and read and write
1A1A000
heap
page read and write
42D0000
direct allocation
page read and write
F39000
stack
page read and write
446E000
direct allocation
page read and write
D03000
heap
page read and write
446E000
direct allocation
page read and write
246E000
stack
page read and write
65B0000
trusted library allocation
page read and write
2762000
trusted library allocation
page read and write
537C000
stack
page read and write
43FD000
direct allocation
page read and write
2C6E000
stack
page read and write
1A0A000
heap
page read and write
191A000
heap
page read and write
2840000
trusted library allocation
page read and write
1A1A000
heap
page read and write
1919000
heap
page read and write
AF8000
stack
page read and write
7F0000
heap
page read and write
1919000
heap
page read and write
54B8000
heap
page read and write
7E0000
heap
page read and write
446E000
direct allocation
page read and write
43F9000
direct allocation
page read and write
D3B000
heap
page read and write
1919000
heap
page read and write
4130000
direct allocation
page read and write
C80000
trusted library allocation
page read and write
CCD000
heap
page read and write
426000
system
page execute and read and write
18A4000
heap
page read and write
273D000
trusted library allocation
page execute and read and write
657E000
stack
page read and write
2830000
trusted library allocation
page execute and read and write
E3F000
unkown
page read and write
18A6000
heap
page read and write
190C000
heap
page read and write
2750000
trusted library allocation
page read and write
2767000
trusted library allocation
page execute and read and write
1939000
heap
page read and write
2DB0000
trusted library allocation
page read and write
4253000
direct allocation
page read and write
2850000
heap
page read and write
6700000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
D80000
unkown
page readonly
C90000
heap
page read and write
559C000
heap
page read and write
2CAE000
stack
page read and write
2D06000
trusted library allocation
page read and write
54ED000
heap
page read and write
E48000
unkown
page readonly
7C5000
heap
page read and write
28B7000
heap
page read and write
1A27000
heap
page read and write
2790000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
1A0B000
heap
page read and write
27E0000
heap
page read and write
E35000
unkown
page readonly
5F5E000
stack
page read and write
519F000
stack
page read and write
18B2000
heap
page read and write
57AD000
trusted library allocation
page read and write
6D00000
heap
page read and write
1919000
heap
page read and write
4253000
direct allocation
page read and write
FA0000
heap
page read and write
2AC8000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
18FC000
heap
page read and write
43FD000
direct allocation
page read and write
4253000
direct allocation
page read and write
2756000
trusted library allocation
page execute and read and write
27DE000
stack
page read and write
2D1E000
trusted library allocation
page read and write
2780000
heap
page read and write
446E000
direct allocation
page read and write
19FB000
heap
page read and write
1A2A000
heap
page read and write
E35000
unkown
page readonly
42D0000
direct allocation
page read and write
2D9A000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
571E000
stack
page read and write
C60000
trusted library section
page read and write
65E0000
trusted library allocation
page read and write
15BE000
stack
page read and write
CC0000
heap
page read and write
43FD000
direct allocation
page read and write
2630000
heap
page read and write
18B2000
heap
page read and write
65C4000
trusted library allocation
page read and write
575E000
stack
page read and write
43FD000
direct allocation
page read and write
E0F000
unkown
page readonly
6AC0000
heap
page read and write
446E000
direct allocation
page read and write
2752000
trusted library allocation
page read and write
42D0000
direct allocation
page read and write
5518000
heap
page read and write
65C0000
trusted library allocation
page read and write
76A000
stack
page read and write
1878000
heap
page read and write
C98000
heap
page read and write
557C000
heap
page read and write
15FC000
stack
page read and write
4130000
direct allocation
page read and write
1790000
direct allocation
page execute and read and write
5E5F000
stack
page read and write
2DDB000
trusted library allocation
page read and write
274D000
trusted library allocation
page execute and read and write
66BE000
stack
page read and write
15CE000
stack
page read and write
6A80000
trusted library allocation
page execute and read and write
6710000
trusted library allocation
page read and write
FEE000
stack
page read and write
2743000
trusted library allocation
page read and write
1919000
heap
page read and write
28B0000
heap
page read and write
2DDD000
trusted library allocation
page read and write
3DE4000
heap
page read and write
2734000
trusted library allocation
page read and write
CEE000
heap
page read and write
18FD000
heap
page read and write
E43000
unkown
page write copy
633D000
stack
page read and write
1A39000
heap
page read and write
190C000
heap
page read and write
2870000
heap
page execute and read and write
6707000
trusted library allocation
page read and write
18AD000
heap
page read and write
D82000
heap
page read and write
206E000
stack
page read and write
18AD000
heap
page read and write
5220000
trusted library allocation
page read and write
1770000
heap
page read and write
19BC000
heap
page read and write
1919000
heap
page read and write
43F9000
direct allocation
page read and write
There are 227 hidden memdumps, click here to show them.