IOC Report
JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe

loading gif

Files

File Path
Type
Category
Malicious
JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp920A.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\nCPTBp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\nCPTBp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nCPTBp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glgfvxai.gnl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfi2qzmj.fh5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkmzknnd.dj3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmbxhxgo.axb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdspk5hw.32y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwe0eix0.t0z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhvhbu5n.t4h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4xzhacs.mmk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpAC0B.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
"C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nCPTBp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nCPTBp" /XML "C:\Users\user\AppData\Local\Temp\tmp920A.tmp"
malicious
C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
"C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe"
malicious
C:\Users\user\AppData\Roaming\nCPTBp.exe
C:\Users\user\AppData\Roaming\nCPTBp.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nCPTBp" /XML "C:\Users\user\AppData\Local\Temp\tmpAC0B.tmp"
malicious
C:\Users\user\AppData\Roaming\nCPTBp.exe
"C:\Users\user\AppData\Roaming\nCPTBp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
AB0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
CC0000
trusted library allocation
page read and write
11BD000
direct allocation
page execute and read and write
D6A000
stack
page read and write
29F1000
trusted library allocation
page read and write
90A000
trusted library allocation
page execute and read and write
8B9C000
stack
page read and write
5704000
heap
page read and write
4C80000
trusted library allocation
page execute and read and write
DF0000
heap
page read and write
7AA000
stack
page read and write
4570000
trusted library allocation
page read and write
D50000
heap
page read and write
29CE000
stack
page read and write
8A1F000
stack
page read and write
29F6000
trusted library allocation
page read and write
240F000
trusted library allocation
page read and write
AA0000
heap
page read and write
122E000
direct allocation
page execute and read and write
7C3000
heap
page read and write
2C9A000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
252F000
stack
page read and write
13D8000
direct allocation
page execute and read and write
86B3000
heap
page read and write
3290000
heap
page read and write
D30000
heap
page read and write
13C0000
direct allocation
page execute and read and write
842F000
stack
page read and write
4F50000
heap
page execute and read and write
279A000
trusted library allocation
page read and write
33C0000
heap
page read and write
900000
trusted library allocation
page read and write
33DC000
heap
page read and write
4A1B000
trusted library allocation
page read and write
F2F000
stack
page read and write
53A1000
trusted library allocation
page read and write
86AC000
stack
page read and write
2F4E000
unkown
page read and write
F2F000
stack
page read and write
7FD000
stack
page read and write
D77000
heap
page read and write
29D4000
trusted library allocation
page read and write
23F6000
trusted library allocation
page read and write
5DCE000
stack
page read and write
1010000
heap
page read and write
5003000
heap
page read and write
8C9C000
stack
page read and write
4BC0000
trusted library allocation
page read and write
A90000
trusted library allocation
page execute and read and write
890000
heap
page read and write
2A7A000
trusted library allocation
page read and write
4A42000
trusted library allocation
page read and write
1090000
direct allocation
page execute and read and write
B40000
heap
page read and write
2F8F000
unkown
page read and write
6EDA1000
unkown
page execute read
10AE000
stack
page read and write
940000
heap
page read and write
CF7000
trusted library allocation
page execute and read and write
540B000
stack
page read and write
3531000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
CEA000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
278B000
trusted library allocation
page read and write
12DF000
stack
page read and write
56CF000
heap
page read and write
8E3000
trusted library allocation
page execute and read and write
4AD0000
trusted library allocation
page read and write
B00000
heap
page read and write
2415000
trusted library allocation
page read and write
DA9000
heap
page read and write
823000
heap
page read and write
81E0000
heap
page read and write
4A60000
trusted library allocation
page read and write
B10000
heap
page read and write
CCD000
trusted library allocation
page execute and read and write
1469000
direct allocation
page execute and read and write
7FCD0000
trusted library allocation
page execute and read and write
1366000
direct allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
86A0000
heap
page read and write
4A10000
trusted library allocation
page read and write
D4E000
stack
page read and write
4BCC000
stack
page read and write
13C6000
direct allocation
page execute and read and write
2583000
trusted library allocation
page read and write
9AD000
stack
page read and write
8B5F000
stack
page read and write
A9E000
stack
page read and write
7FF000
heap
page read and write
4F5E000
stack
page read and write
F60000
heap
page read and write
650000
heap
page read and write
3A39000
trusted library allocation
page read and write
D73000
heap
page read and write
5C00000
trusted library section
page read and write
23F4000
trusted library allocation
page read and write
4D20000
heap
page execute and read and write
357F000
trusted library allocation
page read and write
79E000
heap
page read and write
81EE000
stack
page read and write
CE6000
trusted library allocation
page execute and read and write
1463000
direct allocation
page execute and read and write
6EDBD000
unkown
page read and write
B30000
heap
page read and write
D50000
heap
page read and write
88DE000
stack
page read and write
538F000
stack
page read and write
AFE000
stack
page read and write
5510000
trusted library allocation
page read and write
CD3000
trusted library allocation
page read and write
7DE0000
heap
page read and write
B49000
heap
page read and write
AA0000
trusted library allocation
page read and write
5ED000
stack
page read and write
D10000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
869E000
stack
page read and write
33CB000
heap
page read and write
29EE000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
2A20000
heap
page execute and read and write
3C0E000
trusted library allocation
page read and write
D3B000
heap
page read and write
859D000
stack
page read and write
912000
trusted library allocation
page read and write
DD5000
heap
page read and write
59DF000
stack
page read and write
891E000
stack
page read and write
1606000
direct allocation
page execute and read and write
665000
heap
page read and write
C8E000
stack
page read and write
4C70000
heap
page read and write
CD0000
trusted library allocation
page read and write
5580000
trusted library allocation
page execute and read and write
6EDA0000
unkown
page readonly
4A50000
heap
page read and write
2A15000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
5CCE000
stack
page read and write
1341000
direct allocation
page execute and read and write
4E5B000
stack
page read and write
80AE000
stack
page read and write
2531000
trusted library allocation
page read and write
4CA1000
trusted library allocation
page read and write
B4B000
heap
page read and write
D2D000
stack
page read and write
46CC000
stack
page read and write
4D10000
trusted library allocation
page read and write
A3A000
stack
page read and write
4F30000
trusted library allocation
page read and write
EE0000
heap
page read and write
832E000
stack
page read and write
1110000
trusted library allocation
page read and write
8CB0000
trusted library allocation
page read and write
8ED000
trusted library allocation
page execute and read and write
4A38000
trusted library allocation
page read and write
4AC0000
heap
page read and write
2A02000
trusted library allocation
page read and write
56BE000
stack
page read and write
8F3000
trusted library allocation
page read and write
456E000
stack
page read and write
C30000
heap
page read and write
B40000
heap
page read and write
D20000
trusted library allocation
page execute and read and write
4FA0000
trusted library allocation
page execute and read and write
12F1000
direct allocation
page read and write
1340000
direct allocation
page execute and read and write
D66000
heap
page read and write
5560000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
6EDBD000
unkown
page read and write
B3C000
stack
page read and write
D8E000
stack
page read and write
E2F000
stack
page read and write
130A000
direct allocation
page read and write
4F75000
trusted library allocation
page read and write
660000
heap
page read and write
29DB000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1347000
direct allocation
page execute and read and write
8E4000
trusted library allocation
page read and write
6EDBF000
unkown
page readonly
5590000
heap
page read and write
FE0000
heap
page read and write
1402000
direct allocation
page execute and read and write
4F60000
trusted library allocation
page read and write
640000
heap
page read and write
902000
trusted library allocation
page read and write
1129000
heap
page read and write
4A36000
trusted library allocation
page read and write
11DF000
stack
page read and write
B36000
heap
page read and write
84F000
heap
page read and write
5701000
heap
page read and write
2EA000
stack
page read and write
5390000
trusted library section
page read and write
DC9000
heap
page read and write
42D000
remote allocation
page execute and read and write
D9E000
stack
page read and write
A8E000
stack
page read and write
106E000
stack
page read and write
4A3D000
trusted library allocation
page read and write
C4E000
stack
page read and write
5000000
heap
page read and write
11B9000
direct allocation
page execute and read and write
4CFE000
stack
page read and write
6EDB6000
unkown
page readonly
5BEE000
stack
page read and write
AA0000
heap
page read and write
86B5000
heap
page read and write
2FE0000
heap
page read and write
23F0000
trusted library allocation
page read and write
906000
trusted library allocation
page execute and read and write
7FCE000
stack
page read and write
C38000
heap
page read and write
2410000
trusted library allocation
page read and write
83BE000
stack
page read and write
4A31000
trusted library allocation
page read and write
12E0000
direct allocation
page read and write
A40000
trusted library allocation
page read and write
660000
unkown
page readonly
EE7000
heap
page read and write
79A000
heap
page read and write
CC4000
trusted library allocation
page read and write
DD0000
heap
page read and write
AB0000
heap
page read and write
AEE000
unkown
page read and write
B00000
heap
page read and write
4A80000
trusted library allocation
page read and write
3E7000
stack
page read and write
57C0000
trusted library allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
D71000
heap
page read and write
662000
unkown
page readonly
111F000
trusted library allocation
page read and write
581D000
stack
page read and write
84BE000
stack
page read and write
3B23000
trusted library allocation
page read and write
4FFE000
stack
page read and write
4A2E000
trusted library allocation
page read and write
1100000
heap
page read and write
135D000
direct allocation
page execute and read and write
2420000
heap
page execute and read and write
2572000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
CFD000
stack
page read and write
CE2000
trusted library allocation
page read and write
91B000
trusted library allocation
page execute and read and write
930000
heap
page read and write
7D1000
heap
page read and write
15F1000
direct allocation
page execute and read and write
AF7000
stack
page read and write
550D000
stack
page read and write
AF0000
heap
page read and write
8A5E000
stack
page read and write
77E000
stack
page read and write
5140000
trusted library allocation
page execute and read and write
56C0000
heap
page read and write
4AE0000
trusted library allocation
page execute and read and write
E1C000
heap
page read and write
53B0000
trusted library section
page read and write
846E000
stack
page read and write
4F80000
heap
page read and write
7F780000
trusted library allocation
page execute and read and write
DD2000
heap
page read and write
917000
trusted library allocation
page execute and read and write
8E0000
trusted library allocation
page read and write
5BAE000
stack
page read and write
81AE000
stack
page read and write
82D000
heap
page read and write
2A31000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
528E000
stack
page read and write
1820000
heap
page read and write
DE0000
heap
page read and write
DCF000
stack
page read and write
10EB000
stack
page read and write
CFB000
trusted library allocation
page execute and read and write
856F000
stack
page read and write
B00000
heap
page read and write
4A53000
heap
page read and write
8FD000
trusted library allocation
page execute and read and write
CF2000
trusted library allocation
page read and write
DD0000
heap
page read and write
D3E000
heap
page read and write
7B42000
trusted library allocation
page read and write
87AF000
stack
page read and write
1356000
direct allocation
page execute and read and write
5120000
trusted library section
page read and write
CDD000
trusted library allocation
page execute and read and write
7B6000
heap
page read and write
4F70000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
7CF000
heap
page read and write
F30000
heap
page read and write
3A31000
trusted library allocation
page read and write
82EF000
stack
page read and write
160D000
direct allocation
page execute and read and write
85AC000
stack
page read and write
10F0000
trusted library allocation
page read and write
5150000
heap
page read and write
23EE000
stack
page read and write
B10000
heap
page read and write
D4F000
unkown
page read and write
A3F000
stack
page read and write
790000
heap
page read and write
DCE000
heap
page read and write
2400000
trusted library allocation
page read and write
4F80000
heap
page read and write
8FD000
stack
page read and write
A5E000
stack
page read and write
87DE000
stack
page read and write
There are 313 hidden memdumps, click here to show them.