IOC Report
hesaphareketi__20241001.exe

loading gif

Files

File Path
Type
Category
Malicious
hesaphareketi__20241001.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hesaphareketi__20241001.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hty4xym.goh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bd1xluqj.ocf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krvza5le.p5j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_svqnh3ct.fgw.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hesaphareketi__20241001.exe
"C:\Users\user\Desktop\hesaphareketi__20241001.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi__20241001.exe"
malicious
C:\Users\user\Desktop\hesaphareketi__20241001.exe
"C:\Users\user\Desktop\hesaphareketi__20241001.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://ftp.normagroup.com.tr
unknown
malicious
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
ftp.normagroup.com.tr
104.247.165.99
malicious

IPs

IP
Domain
Country
Malicious
104.247.165.99
ftp.normagroup.com.tr
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi__20241001_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
48DA000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
8B1C000
heap
page read and write
51D0000
trusted library allocation
page read and write
51DE000
trusted library allocation
page read and write
68BC000
stack
page read and write
6AB0000
heap
page read and write
6670000
heap
page read and write
A9A6000
trusted library allocation
page read and write
1556000
trusted library allocation
page execute and read and write
5ECE000
stack
page read and write
6ABE000
heap
page read and write
2AC3000
trusted library allocation
page execute and read and write
55C2000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
6260000
trusted library allocation
page execute and read and write
79E1000
heap
page read and write
636E000
stack
page read and write
D80D000
stack
page read and write
628D000
trusted library allocation
page read and write
615C000
stack
page read and write
10EB000
heap
page read and write
A9BF000
trusted library allocation
page read and write
F30000
heap
page read and write
50BC000
stack
page read and write
1550000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
7BBE000
stack
page read and write
3EB7000
trusted library allocation
page read and write
5304000
heap
page read and write
5FFB000
stack
page read and write
F60000
heap
page read and write
B247000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
5B2E000
stack
page read and write
A9CE000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
B26F000
trusted library allocation
page read and write
63A4000
heap
page read and write
55C5000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
10AC000
stack
page read and write
1552000
trusted library allocation
page read and write
F20000
heap
page read and write
55B0000
heap
page read and write
3014000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
51DB000
trusted library allocation
page read and write
139E000
stack
page read and write
7650000
heap
page read and write
51F1000
trusted library allocation
page read and write
CB0000
unkown
page readonly
8B00000
heap
page read and write
623C000
trusted library allocation
page read and write
B1B5000
trusted library allocation
page read and write
B265000
trusted library allocation
page read and write
13DE000
stack
page read and write
B233000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
1438000
heap
page read and write
11A1F000
trusted library allocation
page read and write
2C60000
heap
page read and write
3F77000
trusted library allocation
page read and write
5280000
heap
page execute and read and write
5540000
trusted library allocation
page read and write
7DBF000
stack
page read and write
11A16000
trusted library allocation
page read and write
638E000
stack
page read and write
5500000
trusted library allocation
page read and write
A9D3000
trusted library allocation
page read and write
A99F000
trusted library allocation
page read and write
11A19000
trusted library allocation
page read and write
B251000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
69FD000
stack
page read and write
D9CE000
stack
page read and write
1560000
trusted library allocation
page read and write
564C000
stack
page read and write
DACE000
stack
page read and write
307F000
stack
page read and write
5550000
trusted library allocation
page read and write
3E57000
trusted library allocation
page read and write
59ED000
stack
page read and write
F14A000
heap
page read and write
3D71000
trusted library allocation
page read and write
527C000
stack
page read and write
A710000
trusted library section
page read and write
2AF7000
trusted library allocation
page execute and read and write
57EE000
stack
page read and write
5220000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
6AB7000
heap
page read and write
B25B000
trusted library allocation
page read and write
3DD6000
trusted library allocation
page read and write
5E80000
heap
page read and write
F119000
trusted library allocation
page read and write
79D0000
heap
page read and write
3E37000
trusted library allocation
page read and write
79C0000
heap
page read and write
3ED7000
trusted library allocation
page read and write
4081000
trusted library allocation
page read and write
5310000
heap
page read and write
15E0000
trusted library allocation
page read and write
76A7000
heap
page read and write
5570000
trusted library allocation
page read and write
7FFE000
stack
page read and write
E40000
heap
page read and write
153D000
trusted library allocation
page execute and read and write
F67000
heap
page read and write
3E97000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
171E000
stack
page read and write
F25000
heap
page read and write
551E000
trusted library allocation
page read and write
15F0000
heap
page read and write
1618000
heap
page read and write
DB0D000
stack
page read and write
5710000
trusted library section
page readonly
2B68000
trusted library allocation
page read and write
A9F1000
trusted library allocation
page read and write
1133000
heap
page read and write
3F37000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
15CE000
stack
page read and write
10C0000
heap
page read and write
5214000
trusted library allocation
page read and write
A9C4000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
1534000
trusted library allocation
page read and write
1250000
heap
page read and write
2F70000
heap
page execute and read and write
10DF000
heap
page read and write
3FD7000
trusted library allocation
page read and write
67BC000
stack
page read and write
6100000
trusted library allocation
page read and write
5AEF000
stack
page read and write
2C50000
trusted library allocation
page execute and read and write
2ACD000
trusted library allocation
page execute and read and write
155A000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
778E000
stack
page read and write
2B5E000
stack
page read and write
1580000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1543000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
DC0E000
stack
page read and write
69BE000
stack
page read and write
5720000
heap
page read and write
B238000
trusted library allocation
page read and write
3FB7000
trusted library allocation
page read and write
6390000
heap
page read and write
A9F6000
trusted library allocation
page read and write
3E17000
trusted library allocation
page read and write
A9B5000
trusted library allocation
page read and write
574F000
stack
page read and write
4E6D000
stack
page read and write
1473000
heap
page read and write
CB2000
unkown
page readonly
6248000
trusted library allocation
page read and write
F11E000
trusted library allocation
page read and write
10F6000
heap
page read and write
5897000
trusted library allocation
page read and write
A9BA000
trusted library allocation
page read and write
F116000
trusted library allocation
page read and write
A9AB000
trusted library allocation
page read and write
143E000
heap
page read and write
634D000
stack
page read and write
2AF5000
trusted library allocation
page execute and read and write
5603000
heap
page read and write
10F8000
heap
page read and write
51E2000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
78EE000
stack
page read and write
2C3C000
stack
page read and write
552D000
trusted library allocation
page read and write
3F97000
trusted library allocation
page read and write
1562000
trusted library allocation
page read and write
6380000
heap
page read and write
14A4000
heap
page read and write
57AE000
stack
page read and write
A9E7000
trusted library allocation
page read and write
5600000
heap
page read and write
5210000
trusted library allocation
page read and write
10C8000
heap
page read and write
65FE000
stack
page read and write
8600000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
95D9000
trusted library allocation
page read and write
DE7C000
stack
page read and write
5730000
heap
page read and write
2AF0000
trusted library allocation
page read and write
13E0000
heap
page read and write
1160000
heap
page read and write
A9C9000
trusted library allocation
page read and write
1148000
heap
page read and write
5521000
trusted library allocation
page read and write
B24C000
trusted library allocation
page read and write
7A4A000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
BD9000
stack
page read and write
129E000
stack
page read and write
8B4E000
heap
page read and write
2F60000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
B260000
trusted library allocation
page read and write
DF9000
stack
page read and write
5760000
heap
page read and write
D62000
unkown
page readonly
1466000
heap
page read and write
79EF000
stack
page read and write
11B2000
heap
page read and write
2DC0000
trusted library allocation
page read and write
51BC000
stack
page read and write
626E000
stack
page read and write
7470000
heap
page read and write
95DE000
trusted library allocation
page read and write
B26A000
trusted library allocation
page read and write
10F7000
stack
page read and write
663E000
stack
page read and write
788E000
stack
page read and write
2AE6000
trusted library allocation
page execute and read and write
308A000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
B224000
trusted library allocation
page read and write
1139000
heap
page read and write
5545000
trusted library allocation
page read and write
578C000
stack
page read and write
1610000
heap
page read and write
B21A000
trusted library allocation
page read and write
4089000
trusted library allocation
page read and write
1533000
trusted library allocation
page execute and read and write
11FC000
stack
page read and write
7A40000
trusted library allocation
page read and write
2D6E000
stack
page read and write
3EF7000
trusted library allocation
page read and write
1430000
heap
page read and write
5725000
heap
page read and write
5300000
heap
page read and write
A9DD000
trusted library allocation
page read and write
6270000
trusted library allocation
page execute and read and write
A9D8000
trusted library allocation
page read and write
56FB000
stack
page read and write
15D0000
trusted library allocation
page execute and read and write
57F0000
heap
page execute and read and write
3F57000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
75F0000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
52EE000
stack
page read and write
32CD000
trusted library allocation
page read and write
7F130000
trusted library allocation
page execute and read and write
60FD000
stack
page read and write
2E45000
trusted library allocation
page read and write
677C000
stack
page read and write
B242000
trusted library allocation
page read and write
A9B0000
trusted library allocation
page read and write
7570000
trusted library allocation
page execute and read and write
2E47000
trusted library allocation
page read and write
DD7B000
stack
page read and write
588E000
stack
page read and write
1207000
heap
page read and write
7890000
trusted library section
page read and write
2ADD000
trusted library allocation
page execute and read and write
5740000
heap
page read and write
A9E2000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
6200000
heap
page read and write
F140000
heap
page read and write
6370000
heap
page read and write
6170000
trusted library allocation
page read and write
156B000
trusted library allocation
page execute and read and write
B229000
trusted library allocation
page read and write
130E000
stack
page read and write
2C40000
heap
page execute and read and write
62B0000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page execute and read and write
2AF2000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
A9EC000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
1200000
heap
page read and write
6AC0000
trusted library allocation
page read and write
3E77000
trusted library allocation
page read and write
95D6000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
7A30000
trusted library allocation
page execute and read and write
6230000
trusted library allocation
page read and write
D7CD000
stack
page read and write
2AC4000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
B22E000
trusted library allocation
page read and write
B23D000
trusted library allocation
page read and write
B21F000
trusted library allocation
page read and write
150D000
heap
page read and write
65BC000
stack
page read and write
B256000
trusted library allocation
page read and write
3F17000
trusted library allocation
page read and write
80FE000
stack
page read and write
6160000
heap
page read and write
5FB0000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
FAC000
stack
page read and write
ADA000
stack
page read and write
51B0000
trusted library allocation
page read and write
1567000
trusted library allocation
page execute and read and write
7640000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
7B72000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
6280000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
A9A1000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
31AA000
trusted library allocation
page read and write
There are 312 hidden memdumps, click here to show them.