IOC Report
Micra.exe

loading gif

Files

File Path
Type
Category
Malicious
Micra.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsb308A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\entomostraca\nonmissionary\Anklages.bod
data
dropped
C:\Users\user\entomostraca\nonmissionary\Fuselfrie.Ana
data
dropped
C:\Users\user\entomostraca\nonmissionary\Procurable\phonetism.ham
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8192.000000
dropped
C:\Users\user\entomostraca\nonmissionary\Procurable\skovtursstemningernes.and
data
dropped
C:\Users\user\entomostraca\nonmissionary\Procurable\telcontar.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\entomostraca\nonmissionary\Septemvir\Bankboksene.Kra
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\entomostraca\nonmissionary\Septemvir\ankomsttidernes.obs
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8637644800.000000
dropped
C:\Users\user\entomostraca\nonmissionary\Septemvir\beggarliness.rab
data
dropped
C:\Users\user\entomostraca\nonmissionary\Septemvir\besindelse.del
data
dropped
C:\Users\user\entomostraca\nonmissionary\Septemvir\bevidsthedsudvidelsen.und
data
dropped
C:\Windows\Resources\nringsmiddelet.ini
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Micra.exe
"C:\Users\user\Desktop\Micra.exe"
malicious
C:\Users\user\Desktop\Micra.exe
"C:\Users\user\Desktop\Micra.exe"
malicious

URLs

Name
IP
Malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
https://www.google.com
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://drive.usercontent.google.com/
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://drive.google.com/
unknown
https://drive.google.com/s
unknown
https://drive.usercontent.google.com/vCp
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.184.206
drive.usercontent.google.com
142.250.185.65

IPs

IP
Domain
Country
Malicious
142.250.184.206
drive.google.com
United States
142.250.185.65
drive.usercontent.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
353C0000
direct allocation
page read and write
malicious
336C000
direct allocation
page execute and read and write
malicious
35730000
direct allocation
page execute and read and write
5709000
heap
page read and write
56B5000
heap
page read and write
56BA000
heap
page read and write
2250000
heap
page read and write
34F5E000
stack
page read and write
710000
heap
page read and write
34F9F000
stack
page read and write
350DF000
stack
page read and write
30A0000
heap
page read and write
433000
unkown
page read and write
443000
unkown
page readonly
3585D000
direct allocation
page execute and read and write
403C000
remote allocation
page execute and read and write
401000
unkown
page execute read
5710000
heap
page read and write
223C000
remote allocation
page execute and read and write
436000
unkown
page read and write
649000
unkown
page execute read
1660000
remote allocation
page execute and read and write
10000000
unkown
page readonly
183C000
remote allocation
page execute and read and write
56B0000
heap
page read and write
610000
direct allocation
page read and write
43A000
unkown
page read and write
353BD000
stack
page read and write
70000
heap
page read and write
34AF0000
direct allocation
page read and write
35410000
direct allocation
page read and write
56CA000
heap
page read and write
3501D000
stack
page read and write
22C0000
heap
page read and write
5696000
heap
page read and write
55F0000
direct allocation
page read and write
5630000
direct allocation
page read and write
5E4000
unkown
page execute read
351F0000
remote allocation
page read and write
5EE000
unkown
page execute read
34EDE000
stack
page read and write
5E0000
direct allocation
page read and write
34B00000
direct allocation
page read and write
55AE000
stack
page read and write
35859000
direct allocation
page execute and read and write
5710000
heap
page read and write
5709000
heap
page read and write
56C8000
heap
page read and write
56BA000
heap
page read and write
443000
unkown
page readonly
2873000
heap
page read and write
17A000
stack
page read and write
5610000
direct allocation
page read and write
5650000
heap
page read and write
600000
direct allocation
page read and write
400000
unkown
page readonly
56C1000
heap
page read and write
5F2000
unkown
page execute read
34B40000
direct allocation
page read and write
71000
heap
page read and write
5696000
heap
page read and write
10003000
unkown
page readonly
5510000
heap
page read and write
3509E000
stack
page read and write
34B10000
direct allocation
page read and write
5696000
heap
page read and write
5EC000
unkown
page execute read
5708000
heap
page read and write
5E8000
unkown
page execute read
470000
heap
page read and write
35A72000
direct allocation
page execute and read and write
56A8000
heap
page read and write
3514E000
stack
page read and write
567D000
heap
page read and write
351F0000
remote allocation
page read and write
5710000
heap
page read and write
5640000
direct allocation
page read and write
56CA000
heap
page read and write
358CE000
direct allocation
page execute and read and write
2871000
heap
page read and write
5710000
heap
page read and write
56C8000
heap
page read and write
400000
unkown
page readonly
409000
unkown
page write copy
5620000
direct allocation
page read and write
5710000
heap
page read and write
56CE000
heap
page read and write
56B0000
heap
page read and write
421000
unkown
page read and write
3526F000
stack
page read and write
5B6C000
direct allocation
page execute and read and write
5527000
heap
page read and write
74E000
heap
page read and write
56CA000
heap
page read and write
34FDD000
stack
page read and write
356AA000
heap
page read and write
570C000
heap
page read and write
352BE000
stack
page read and write
407000
unkown
page readonly
34B20000
direct allocation
page read and write
656C000
direct allocation
page execute and read and write
5657000
heap
page read and write
400000
unkown
page readonly
287A000
heap
page read and write
56CD000
heap
page read and write
35410000
direct allocation
page read and write
55EF000
stack
page read and write
2875000
heap
page read and write
287E000
heap
page read and write
5709000
heap
page read and write
56CE000
heap
page read and write
34F1F000
stack
page read and write
56C8000
heap
page read and write
429000
unkown
page read and write
363C000
remote allocation
page execute and read and write
516C000
direct allocation
page execute and read and write
35410000
direct allocation
page read and write
5600000
direct allocation
page read and write
56B5000
heap
page read and write
56C1000
heap
page read and write
5E6000
unkown
page execute read
2877000
heap
page read and write
3090000
heap
page read and write
56B5000
heap
page read and write
630000
direct allocation
page read and write
590000
direct allocation
page read and write
476C000
direct allocation
page execute and read and write
359FD000
direct allocation
page execute and read and write
287C000
heap
page read and write
2878000
heap
page read and write
2C3C000
remote allocation
page execute and read and write
5F0000
unkown
page execute read
626000
unkown
page execute read
35A01000
direct allocation
page execute and read and write
3190000
direct allocation
page execute and read and write
718000
heap
page read and write
5525000
heap
page read and write
9B000
stack
page read and write
2872000
heap
page read and write
575000
heap
page read and write
407000
unkown
page readonly
409000
unkown
page write copy
566B000
heap
page read and write
287B000
heap
page read and write
570000
heap
page read and write
56C8000
heap
page read and write
550000
heap
page read and write
353C7000
heap
page read and write
351F0000
remote allocation
page read and write
5F0000
direct allocation
page read and write
35410000
direct allocation
page read and write
56B0000
heap
page read and write
5709000
heap
page read and write
5B0000
direct allocation
page read and write
567C000
heap
page read and write
5708000
heap
page read and write
53D0000
heap
page read and write
10005000
unkown
page readonly
440000
unkown
page read and write
443000
unkown
page readonly
409000
unkown
page read and write
5C0000
direct allocation
page read and write
3557D000
heap
page read and write
35410000
direct allocation
page read and write
54EE000
stack
page read and write
10001000
unkown
page execute read
356A6000
heap
page read and write
353C0000
direct allocation
page read and write
567C000
heap
page read and write
580000
direct allocation
page read and write
3522E000
stack
page read and write
401000
unkown
page execute read
556F000
stack
page read and write
3D6C000
direct allocation
page execute and read and write
620000
direct allocation
page read and write
34B30000
direct allocation
page read and write
2876000
heap
page read and write
401000
unkown
page execute read
3571B000
heap
page read and write
407000
unkown
page readonly
4A3C000
remote allocation
page execute and read and write
5520000
heap
page read and write
287E000
heap
page read and write
354EA000
heap
page read and write
56A8000
heap
page read and write
3518E000
stack
page read and write
56C8000
heap
page read and write
56BA000
heap
page read and write
35410000
direct allocation
page read and write
54F0000
heap
page read and write
5709000
heap
page read and write
56C1000
heap
page read and write
350F0000
heap
page read and write
5D0000
direct allocation
page read and write
5A0000
direct allocation
page read and write
401000
unkown
page execute read
23D0000
heap
page read and write
5EA000
unkown
page execute read
56AA000
heap
page read and write
There are 189 hidden memdumps, click here to show them.