IOC Report
DHL AWB_NO_92847309329.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL AWB_NO_92847309329.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL AWB_NO_92847309329.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpE78A.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\rjOyFV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\rjOyFV.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rjOyFV.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0f21muy.tc2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etv3k0mc.fpf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r235kwox.5ca.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzkkmrym.dk2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp36E.tmp
XML 1.0 document, ASCII text
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL AWB_NO_92847309329.exe
"C:\Users\user\Desktop\DHL AWB_NO_92847309329.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rjOyFV.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rjOyFV" /XML "C:\Users\user\AppData\Local\Temp\tmpE78A.tmp"
malicious
C:\Users\user\Desktop\DHL AWB_NO_92847309329.exe
"C:\Users\user\Desktop\DHL AWB_NO_92847309329.exe"
malicious
C:\Users\user\AppData\Roaming\rjOyFV.exe
C:\Users\user\AppData\Roaming\rjOyFV.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rjOyFV" /XML "C:\Users\user\AppData\Local\Temp\tmp36E.tmp"
malicious
C:\Users\user\AppData\Roaming\rjOyFV.exe
"C:\Users\user\AppData\Roaming\rjOyFV.exe"
malicious
C:\Users\user\AppData\Roaming\rjOyFV.exe
"C:\Users\user\AppData\Roaming\rjOyFV.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
windowsocttehe.duckdns.org
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://geoplugin.net/json.gp&
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://geoplugin.net/json.gpl
unknown
http://www.fontbureau.com/designers?
unknown
http://geoplugin.net/json.gpm
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://tempuri.org/DatabaseWalletDataSet.xsd
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
windowsocttehe.duckdns.org
96.9.210.71
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
96.9.210.71
windowsocttehe.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\764-0XPV9J
exepath
HKEY_CURRENT_USER\SOFTWARE\764-0XPV9J
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
CBA000
heap
page read and write
malicious
1587000
heap
page read and write
malicious
7000000
trusted library section
page read and write
malicious
3A69000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4586000
trusted library allocation
page read and write
malicious
2E30000
trusted library allocation
page read and write
1450000
heap
page read and write
34CF000
stack
page read and write
471000
remote allocation
page execute and read and write
EF0000
heap
page read and write
2A0D000
trusted library allocation
page read and write
3E2F000
stack
page read and write
6CED000
trusted library allocation
page read and write
C48E000
stack
page read and write
1457000
heap
page read and write
7120000
trusted library allocation
page read and write
AFC000
stack
page read and write
2E98000
trusted library allocation
page read and write
33A0000
heap
page read and write
2A23000
heap
page read and write
2C60000
trusted library allocation
page read and write
54C0000
heap
page read and write
5300000
trusted library allocation
page read and write
3FBA000
trusted library allocation
page read and write
11FB000
stack
page read and write
FF0000
heap
page read and write
10B7000
heap
page read and write
7280000
trusted library allocation
page read and write
78D000
stack
page read and write
10BD000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
5160000
trusted library allocation
page execute and read and write
7EF70000
trusted library allocation
page execute and read and write
C40000
trusted library allocation
page read and write
5A67000
heap
page read and write
717E000
stack
page read and write
5100000
heap
page read and write
1104000
heap
page read and write
1617000
heap
page read and write
704C000
heap
page read and write
302B000
heap
page read and write
1102000
heap
page read and write
E9E000
stack
page read and write
7DE000
stack
page read and write
53AD000
stack
page read and write
C8CE000
stack
page read and write
5840000
heap
page read and write
56E0000
trusted library allocation
page read and write
C72E000
stack
page read and write
52D0000
trusted library allocation
page read and write
A5AE000
stack
page read and write
CB0E000
stack
page read and write
49EB000
trusted library allocation
page read and write
715E000
heap
page read and write
E9F000
stack
page read and write
C52000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
C62D000
stack
page read and write
2A40000
trusted library allocation
page read and write
59EE000
stack
page read and write
CD8C000
stack
page read and write
A22E000
stack
page read and write
FF5000
heap
page read and write
2DBF000
stack
page read and write
D5D000
heap
page read and write
28F0000
heap
page read and write
EDE000
stack
page read and write
BD0000
heap
page read and write
52A0000
heap
page read and write
4176000
trusted library allocation
page read and write
9E7D000
stack
page read and write
1615000
heap
page read and write
CD7000
heap
page read and write
143E000
stack
page read and write
72A0000
trusted library allocation
page execute and read and write
10A4000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
76C000
stack
page read and write
AF7000
stack
page read and write
C5E000
stack
page read and write
1603000
heap
page read and write
FFF000
stack
page read and write
15FE000
heap
page read and write
56D0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
4EE2000
trusted library allocation
page read and write
2D40000
heap
page read and write
5A3E000
heap
page read and write
515C000
stack
page read and write
7E0000
heap
page read and write
A5EC000
stack
page read and write
CC4E000
stack
page read and write
5800000
trusted library allocation
page execute and read and write
5A4C000
heap
page read and write
57FE000
stack
page read and write
A32E000
stack
page read and write
46E000
remote allocation
page execute and read and write
13D0000
trusted library allocation
page read and write
3FD2000
trusted library allocation
page read and write
CC9000
heap
page read and write
31AD000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
5830000
heap
page read and write
830000
heap
page read and write
14AE000
stack
page read and write
2E51000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
326F000
stack
page read and write
5352000
trusted library allocation
page read and write
C340000
trusted library allocation
page execute and read and write
1008000
trusted library allocation
page read and write
590000
unkown
page readonly
795E000
stack
page read and write
2A01000
trusted library allocation
page read and write
6FA0000
heap
page read and write
5350000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
2D30000
heap
page read and write
2C76000
trusted library allocation
page read and write
2A20000
heap
page read and write
2990000
heap
page execute and read and write
880000
heap
page read and write
13C2000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
CA0E000
stack
page read and write
A0BE000
stack
page read and write
13CA000
trusted library allocation
page execute and read and write
4B5C000
stack
page read and write
87E000
unkown
page read and write
2A50000
heap
page read and write
7140000
heap
page read and write
54A0000
trusted library section
page readonly
C4D000
trusted library allocation
page execute and read and write
780000
heap
page read and write
4F20000
trusted library allocation
page read and write
10F4000
heap
page read and write
A6EC000
stack
page read and write
9C4F000
stack
page read and write
184F000
stack
page read and write
29FE000
trusted library allocation
page read and write
A36E000
stack
page read and write
529B000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
54A4000
trusted library section
page readonly
1440000
trusted library allocation
page execute and read and write
5433000
heap
page read and write
6F0E000
heap
page read and write
C34000
trusted library allocation
page read and write
C90000
trusted library allocation
page execute and read and write
40BF000
trusted library allocation
page read and write
790000
heap
page read and write
67C000
unkown
page readonly
7110000
heap
page read and write
5825000
heap
page read and write
112F000
heap
page read and write
770000
heap
page read and write
7310000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
4ED0000
heap
page read and write
50D0000
trusted library section
page readonly
C38D000
stack
page read and write
7D0000
heap
page read and write
29E0000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
592000
unkown
page readonly
15C6000
heap
page read and write
74F0000
trusted library allocation
page read and write
730E000
stack
page read and write
3FFC000
trusted library allocation
page read and write
C3D000
trusted library allocation
page execute and read and write
50E0000
heap
page execute and read and write
10B0000
heap
page read and write
5410000
trusted library allocation
page read and write
3F45000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
3E6E000
trusted library allocation
page read and write
BF0000
heap
page read and write
2C3B000
stack
page read and write
7030000
heap
page read and write
C43000
trusted library allocation
page read and write
7121000
heap
page read and write
9B4E000
stack
page read and write
29DB000
stack
page read and write
D94000
heap
page read and write
29EB000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
117F000
heap
page read and write
107E000
stack
page read and write
2D50000
heap
page read and write
2DAE000
unkown
page read and write
C30000
trusted library allocation
page read and write
15F1000
heap
page read and write
C4ED000
stack
page read and write
EF7000
stack
page read and write
13DB000
trusted library allocation
page execute and read and write
3180000
heap
page read and write
2D7E000
stack
page read and write
739E000
stack
page read and write
CE4000
heap
page read and write
2D60000
heap
page read and write
A93E000
stack
page read and write
10CA000
heap
page read and write
CB4E000
stack
page read and write
9F7E000
stack
page read and write
10B3000
trusted library allocation
page read and write
15CF000
heap
page read and write
13C6000
trusted library allocation
page execute and read and write
7020000
heap
page read and write
F9E000
stack
page read and write
549B000
stack
page read and write
7044000
heap
page read and write
5A10000
heap
page read and write
6B00000
trusted library allocation
page read and write
1610000
heap
page read and write
328F000
stack
page read and write
54F0000
heap
page execute and read and write
727F000
stack
page read and write
C20000
trusted library allocation
page read and write
56F0000
heap
page read and write
15E1000
heap
page read and write
C62000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
10FC000
stack
page read and write
14B0000
heap
page read and write
D1C000
heap
page read and write
5440000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page execute and read and write
A700000
heap
page read and write
CE2000
heap
page read and write
CAE000
heap
page read and write
CA8000
heap
page read and write
7EF10000
trusted library allocation
page execute and read and write
312E000
stack
page read and write
5820000
heap
page read and write
5430000
heap
page read and write
2C0A000
heap
page read and write
5110000
heap
page read and write
13F0000
trusted library allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
29EF000
unkown
page read and write
C5A000
trusted library allocation
page execute and read and write
C5EE000
stack
page read and write
52B6000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
9FBE000
stack
page read and write
7290000
trusted library allocation
page read and write
2E40000
heap
page execute and read and write
12BE000
stack
page read and write
BE0000
heap
page read and write
10A3000
trusted library allocation
page execute and read and write
B6A000
stack
page read and write
2C40000
heap
page read and write
10CE000
heap
page read and write
10A0000
trusted library allocation
page read and write
2C9D000
stack
page read and write
52C2000
trusted library allocation
page read and write
7320000
trusted library allocation
page execute and read and write
6B22000
trusted library allocation
page read and write
3020000
heap
page read and write
3D2E000
stack
page read and write
54D0000
trusted library allocation
page execute and read and write
4EF0000
trusted library allocation
page execute and read and write
3E59000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
73A5000
trusted library allocation
page read and write
10C0000
heap
page read and write
6CCE000
trusted library allocation
page read and write
C9CE000
stack
page read and write
2960000
trusted library allocation
page read and write
2D8F000
stack
page read and write
73A0000
trusted library allocation
page read and write
1580000
heap
page read and write
5A19000
heap
page read and write
54B0000
heap
page read and write
29A0000
heap
page read and write
CEB000
heap
page read and write
13BF000
stack
page read and write
C6B000
trusted library allocation
page execute and read and write
C0E000
stack
page read and write
2970000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
CA0000
heap
page read and write
7CA000
stack
page read and write
155E000
stack
page read and write
5115000
heap
page read and write
A46E000
stack
page read and write
52AE000
trusted library allocation
page read and write
CC8C000
stack
page read and write
2EB4000
trusted library allocation
page read and write
2C1D000
heap
page read and write
A83E000
stack
page read and write
1090000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
475000
remote allocation
page execute and read and write
5340000
heap
page read and write
70A000
stack
page read and write
10B0000
trusted library allocation
page read and write
CA0000
heap
page read and write
5A50000
heap
page read and write
C33000
trusted library allocation
page execute and read and write
CA7000
heap
page read and write
13D2000
trusted library allocation
page read and write
2C00000
heap
page read and write
C1D000
stack
page read and write
4F00000
trusted library allocation
page read and write
2CDA000
stack
page read and write
5360000
trusted library allocation
page execute and read and write
5440000
trusted library allocation
page read and write
10F8000
heap
page read and write
471000
remote allocation
page execute and read and write
C67000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
C56000
trusted library allocation
page execute and read and write
10DF000
heap
page read and write
6F00000
heap
page read and write
52B1000
trusted library allocation
page read and write
295E000
stack
page read and write
161E000
heap
page read and write
7161000
heap
page read and write
13D7000
trusted library allocation
page execute and read and write
5A00000
heap
page read and write
2AC4000
trusted library allocation
page read and write
A4AE000
stack
page read and write
4976000
trusted library allocation
page read and write
4F4C000
stack
page read and write
50F0000
heap
page read and write
160E000
heap
page read and write
40B3000
trusted library allocation
page read and write
1510000
heap
page read and write
9A50000
trusted library section
page read and write
52D5000
trusted library allocation
page read and write
322E000
stack
page read and write
56EE000
trusted library allocation
page read and write
BD0000
heap
page read and write
C50000
trusted library allocation
page read and write
103E000
stack
page read and write
1460000
heap
page read and write
4EE0000
trusted library allocation
page read and write
5294000
trusted library allocation
page read and write
7130000
trusted library allocation
page execute and read and write
2DEF000
unkown
page read and write
There are 334 hidden memdumps, click here to show them.