IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\Setup Log 2024-10-30 #001.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\is-0EH0G.tmp\Setup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\is-8Q1AL.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
C:\Users\user\AppData\Local\Temp\is-0EH0G.tmp\Setup.tmp
"C:\Users\user~1\AppData\Local\Temp\is-0EH0G.tmp\Setup.tmp" /SL5="$20422,86016,0,C:\Users\user\Desktop\Setup.exe"

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.remobjects.com/psU
unknown
http://ocsp.sectigo.com0
unknown
https://sectigo.com/CPS0B
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://www.ooaccess.com
unknown
http://www.ooaccess.com&
unknown
https://sectigo.com/CPS0D
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
unknown
http://license.openoptionsinc.com/LicenseFile?HaspKey=%s&Product=FULIC
unknown
http://www.remobjects.com/ps
unknown
http://www.openoptionsinc.com
unknown
https://ooaccess.com/v7
unknown
http://license.openoptionsinc.com/LicenseFile?SoftKey=%s&Product=FULIC&Username=%s&Password=%s
unknown
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
unknown
http://license.ooinc.com/Download/FlexAPI
unknown
http://license.openoptionsinc.com/LicenseFile?SoftKey=%s&Product=FULIC
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
200.163.202.172.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence

Memdumps

Base Address
Regiontype
Protect
Malicious
2420000
direct allocation
page read and write
866000
heap
page read and write
894000
heap
page read and write
32FE000
stack
page read and write
49C000
unkown
page write copy
863000
heap
page read and write
49E000
unkown
page read and write
894000
heap
page read and write
790000
direct allocation
page execute and read and write
9B000
stack
page read and write
412000
unkown
page readonly
894000
heap
page read and write
401000
unkown
page execute read
4AE000
unkown
page readonly
33FF000
stack
page read and write
4AE000
unkown
page readonly
866000
heap
page read and write
85B000
heap
page read and write
5F0000
heap
page read and write
401000
unkown
page execute read
818000
heap
page read and write
2260000
direct allocation
page read and write
480000
heap
page read and write
21BC000
direct allocation
page read and write
2020000
direct allocation
page read and write
19C000
stack
page read and write
89A000
heap
page read and write
894000
heap
page read and write
353F000
stack
page read and write
21B0000
direct allocation
page read and write
7F9000
heap
page read and write
40E000
unkown
page write copy
840000
heap
page read and write
400000
unkown
page readonly
49A000
heap
page read and write
866000
heap
page read and write
2038000
direct allocation
page read and write
4D0000
heap
page read and write
770000
heap
page read and write
49C000
unkown
page read and write
400000
unkown
page readonly
430000
heap
page read and write
401000
unkown
page execute read
2430000
heap
page read and write
82C000
heap
page read and write
7C0000
heap
page read and write
7F5000
heap
page read and write
2434000
heap
page read and write
49D000
unkown
page write copy
400000
unkown
page readonly
7F0000
heap
page read and write
490000
heap
page read and write
343E000
stack
page read and write
4B8000
heap
page read and write
2024000
direct allocation
page read and write
855000
heap
page read and write
40C000
unkown
page write copy
412000
unkown
page readonly
231C000
direct allocation
page read and write
2780000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
89A000
heap
page read and write
84C000
heap
page read and write
401000
unkown
page execute read
610000
heap
page read and write
7D0000
heap
page read and write
3100000
heap
page read and write
4A0000
unkown
page write copy
2030000
direct allocation
page read and write
400000
unkown
page readonly
19B000
stack
page read and write
5F0000
heap
page read and write
810000
heap
page read and write
228E000
direct allocation
page read and write
8AE000
heap
page read and write
21B8000
direct allocation
page read and write
40C000
unkown
page read and write
96000
stack
page read and write
616000
heap
page read and write
21B7000
direct allocation
page read and write
31C0000
heap
page read and write
420000
heap
page read and write
2360000
direct allocation
page read and write
2260000
direct allocation
page read and write
There are 74 hidden memdumps, click here to show them.