IOC Report
Dokument_2024-10-24_135211.exe

loading gif

Files

File Path
Type
Category
Malicious
Dokument_2024-10-24_135211.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nonagglutinant
data
dropped
C:\Users\user\AppData\Roaming\AYT.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AYT.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Oct 25 06:16:02 2024, mtime=Fri Oct 25 06:16:02 2024, atime=Fri Oct 25 06:16:02 2024, length=45984, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Dokument_2024-10-24_135211.exe
"C:\Users\user\Desktop\Dokument_2024-10-24_135211.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Dokument_2024-10-24_135211.exe"
malicious

URLs

Name
IP
Malicious
154.216.18.238
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
154.216.18.238
unknown
Seychelles
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1710000
direct allocation
page read and write
malicious
2381000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3EA0000
direct allocation
page read and write
3EA0000
direct allocation
page read and write
704000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
4F89000
stack
page read and write
9CE000
stack
page read and write
3BB0000
heap
page read and write
5290000
heap
page read and write
73B000
trusted library allocation
page execute and read and write
510D000
stack
page read and write
3D55000
heap
page read and write
5250000
trusted library allocation
page read and write
5EDF000
stack
page read and write
795000
heap
page read and write
3381000
trusted library allocation
page read and write
4AEE000
stack
page read and write
4F96000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
553E000
stack
page read and write
33E7000
trusted library allocation
page read and write
940000
heap
page read and write
3D60000
heap
page read and write
966000
heap
page read and write
4169000
direct allocation
page read and write
713000
trusted library allocation
page read and write
4388000
trusted library allocation
page read and write
520000
heap
page read and write
960000
heap
page read and write
703000
trusted library allocation
page execute and read and write
3FC3000
direct allocation
page read and write
416D000
direct allocation
page read and write
3CDD000
heap
page read and write
A20000
heap
page read and write
A2A000
heap
page read and write
6DE000
stack
page read and write
5F1E000
stack
page read and write
527000
heap
page read and write
4169000
direct allocation
page read and write
4940000
heap
page read and write
56E000
stack
page read and write
41DE000
direct allocation
page read and write
65DC000
stack
page read and write
41DE000
direct allocation
page read and write
3D5F000
heap
page execute and read and write
3EA0000
direct allocation
page read and write
2190000
heap
page read and write
416D000
direct allocation
page read and write
5E5D000
stack
page read and write
6F0000
trusted library allocation
page read and write
5F5F000
stack
page read and write
23BA000
trusted library allocation
page read and write
970000
heap
page read and write
41DE000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
236E000
stack
page read and write
9A000
stack
page read and write
A15000
heap
page read and write
400000
unkown
page readonly
524C000
stack
page read and write
726000
trusted library allocation
page execute and read and write
5C19000
heap
page read and write
768000
heap
page read and write
722000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4169000
direct allocation
page read and write
41DE000
direct allocation
page read and write
48E0000
trusted library allocation
page read and write
5460000
trusted library allocation
page execute and read and write
430000
heap
page read and write
4FBD000
trusted library allocation
page read and write
2320000
heap
page read and write
416D000
direct allocation
page read and write
400000
system
page execute and read and write
482000
unkown
page readonly
4AB000
unkown
page readonly
3EA0000
direct allocation
page read and write
4040000
direct allocation
page read and write
4169000
direct allocation
page read and write
760000
heap
page read and write
4169000
direct allocation
page read and write
3D6E000
heap
page read and write
9E0000
heap
page read and write
161F000
stack
page read and write
843000
heap
page read and write
857000
heap
page read and write
4943000
heap
page read and write
700000
trusted library allocation
page read and write
4D4E000
stack
page read and write
21B0000
trusted library allocation
page execute and read and write
4040000
direct allocation
page read and write
1660000
heap
page read and write
9E5000
heap
page read and write
4040000
direct allocation
page read and write
3064000
heap
page read and write
649C000
stack
page read and write
A2E000
heap
page read and write
510000
heap
page read and write
8AF000
stack
page read and write
71D000
trusted library allocation
page execute and read and write
4AB000
unkown
page readonly
93E000
stack
page read and write
22EE000
stack
page read and write
720000
trusted library allocation
page read and write
3FC3000
direct allocation
page read and write
3D63000
heap
page read and write
4B00000
heap
page execute and read and write
5110000
heap
page read and write
95E000
stack
page read and write
3060000
heap
page read and write
839000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2F00000
heap
page read and write
3BAF000
stack
page read and write
797000
heap
page read and write
2FA8000
heap
page read and write
416D000
direct allocation
page read and write
5D0000
heap
page read and write
732000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
451D000
stack
page read and write
165E000
stack
page read and write
4930000
trusted library allocation
page read and write
7F3D0000
trusted library allocation
page execute and read and write
492D000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
121E000
stack
page read and write
5BE0000
heap
page read and write
5F9C000
stack
page read and write
A10000
heap
page read and write
4040000
direct allocation
page read and write
48DE000
stack
page read and write
22F0000
trusted library allocation
page read and write
635C000
stack
page read and write
4FB1000
trusted library allocation
page read and write
2FAB000
heap
page read and write
3FC3000
direct allocation
page read and write
4E4E000
stack
page read and write
4920000
trusted library allocation
page read and write
659D000
stack
page read and write
5AE000
stack
page read and write
5D5000
heap
page read and write
218C000
stack
page read and write
3C0A000
heap
page read and write
3FC3000
direct allocation
page read and write
78A000
heap
page read and write
3D7E000
heap
page read and write
A5A000
heap
page read and write
70D000
trusted library allocation
page execute and read and write
645E000
stack
page read and write
4169000
direct allocation
page read and write
401000
unkown
page execute read
2370000
heap
page execute and read and write
BB000
stack
page read and write
214E000
stack
page read and write
5280000
trusted library allocation
page execute and read and write
5449000
stack
page read and write
401000
unkown
page execute read
482000
unkown
page readonly
8FE000
stack
page read and write
4040000
direct allocation
page read and write
4040000
direct allocation
page read and write
416D000
direct allocation
page read and write
37AE000
stack
page read and write
1700000
heap
page read and write
89F000
stack
page read and write
3FC3000
direct allocation
page read and write
3C8D000
heap
page read and write
1B7000
stack
page read and write
54B0000
trusted library allocation
page read and write
5E9D000
stack
page read and write
21E0000
heap
page read and write
4FAE000
trusted library allocation
page read and write
609D000
stack
page read and write
400000
unkown
page readonly
4E8A000
stack
page read and write
4FC2000
trusted library allocation
page read and write
72A000
trusted library allocation
page execute and read and write
4A7000
unkown
page read and write
490000
unkown
page read and write
1E0000
heap
page read and write
3D55000
heap
page read and write
490000
unkown
page write copy
3EA0000
direct allocation
page read and write
3BDB000
heap
page read and write
737000
trusted library allocation
page execute and read and write
500E000
stack
page read and write
3EA0000
direct allocation
page read and write
66DE000
stack
page read and write
8B4000
stack
page read and write
33A9000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
100000
heap
page read and write
40C000
system
page execute and read and write
48E9000
trusted library allocation
page read and write
1750000
heap
page read and write
3CDC000
heap
page read and write
21C0000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
3FC3000
direct allocation
page read and write
54C0000
heap
page read and write
54F0000
heap
page read and write
77E000
heap
page read and write
41DE000
direct allocation
page read and write
489E000
stack
page read and write
There are 199 hidden memdumps, click here to show them.