IOC Report
ATT00004.zip

loading gif

Files

File Path
Type
Category
Malicious
ATT00004.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\ATT00004.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
323B000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
2870000
heap
page read and write
3243000
trusted library allocation
page read and write
32BD000
trusted library allocation
page read and write
FDE000
heap
page read and write
1422000
trusted library allocation
page execute and read and write
2875000
heap
page read and write
3251000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
3240000
trusted library allocation
page read and write
16F0000
heap
page read and write
3225000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
C90000
heap
page read and write
CA0000
heap
page read and write
1430000
trusted library allocation
page read and write
26D0000
heap
page read and write
F90000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
FF6000
heap
page read and write
EF6000
stack
page read and write
FC0000
heap
page read and write
572E000
stack
page read and write
32C0000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
10E5000
heap
page read and write
143A000
trusted library allocation
page execute and read and write
15C0000
heap
page read and write
32B2000
trusted library allocation
page read and write
146B000
trusted library allocation
page execute and read and write
32CE000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
C70000
heap
page read and write
DAF000
stack
page read and write
F20000
heap
page read and write
3257000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
1452000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page read and write
EF9000
stack
page read and write
3293000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
BBC000
stack
page read and write
143C000
trusted library allocation
page execute and read and write
F30000
heap
page read and write
32AF000
trusted library allocation
page read and write
7EC000
stack
page read and write
32B7000
trusted library allocation
page read and write
14A0000
heap
page execute and read and write
B50000
heap
page read and write
3296000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
12C0000
heap
page read and write
32A9000
trusted library allocation
page read and write
1467000
trusted library allocation
page execute and read and write
1432000
trusted library allocation
page execute and read and write
321E000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
AFD000
stack
page read and write
3288000
trusted library allocation
page read and write
562E000
stack
page read and write
145A000
trusted library allocation
page execute and read and write
32A1000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
100D000
heap
page read and write
3274000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
329B000
trusted library allocation
page read and write
EFB000
stack
page read and write
C6E000
stack
page read and write
32E1000
trusted library allocation
page read and write
10E0000
heap
page read and write
531F000
stack
page read and write
32BA000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
586F000
stack
page read and write
FDB000
heap
page read and write
7F2D0000
trusted library allocation
page execute and read and write
521E000
stack
page read and write
3232000
trusted library allocation
page read and write
16CE000
stack
page read and write
3290000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
576E000
stack
page read and write
15A0000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
3266000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
14EE000
stack
page read and write
FC8000
heap
page read and write
13D0000
heap
page read and write
3285000
trusted library allocation
page read and write
There are 100 hidden memdumps, click here to show them.