IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\412421\Linux.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ScribeSync.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\ScribeSoft Systems\w
data
dropped
C:\Users\user\AppData\Local\Temp\412421\M
data
dropped
C:\Users\user\AppData\Local\Temp\Biography
ASCII text, with very long lines (945), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Biography.cmd (copy)
ASCII text, with very long lines (945), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Corner
data
dropped
C:\Users\user\AppData\Local\Temp\Diagnostic
data
dropped
C:\Users\user\AppData\Local\Temp\Disposition
data
dropped
C:\Users\user\AppData\Local\Temp\Domestic
data
dropped
C:\Users\user\AppData\Local\Temp\Hollow
data
dropped
C:\Users\user\AppData\Local\Temp\Marie
data
dropped
C:\Users\user\AppData\Local\Temp\Mrs
data
dropped
C:\Users\user\AppData\Local\Temp\Options
data
dropped
C:\Users\user\AppData\Local\Temp\Participated
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Biography Biography.cmd & Biography.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 412421
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "uncertaintycompetitionsadvertisingorganisation" Marie
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Participated + ..\Corner + ..\Domestic + ..\Disposition + ..\Diagnostic + ..\Options + ..\Mrs M
malicious
C:\Users\user\AppData\Local\Temp\412421\Linux.pif
Linux.pif M
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ScribeSync.url" & echo URL="C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ScribeSync.url" & exit
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.js"
malicious
C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.pif
"C:\Users\user\AppData\Local\ScribeSoft Systems\ScribeSync.pif" "C:\Users\user\AppData\Local\ScribeSoft Systems\w"
malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://www.autoitscript.com/autoit3/
unknown

Domains

Name
IP
Malicious
microsoft-10.ovslegodl.sched.ovscdns.com
43.152.28.43
BkByEfukMORgCb.BkByEfukMORgCb
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
2EA2000
heap
page read and write
489000
unkown
page readonly
469000
unkown
page read and write
3B11000
heap
page read and write
2FCB000
heap
page read and write
2A6528B9000
heap
page read and write
2E80000
heap
page read and write
2EAC000
heap
page read and write
28AE000
unkown
page read and write
3DC2000
heap
page read and write
11BF000
stack
page read and write
3DC1000
heap
page read and write
1CA0000
trusted library allocation
page read and write
27BF000
stack
page read and write
3DE0000
heap
page read and write
3DC1000
heap
page read and write
1CA0000
trusted library allocation
page read and write
2A6528F6000
heap
page read and write
2A652830000
heap
page read and write
12B4000
heap
page read and write
4E0F000
stack
page read and write
2A6528BF000
heap
page read and write
141A000
heap
page read and write
390000
heap
page read and write
11DC000
heap
page read and write
3650000
trusted library allocation
page read and write
ED0000
heap
page read and write
2DC0000
heap
page read and write
3650000
trusted library allocation
page read and write
396000
unkown
page readonly
3C1000
unkown
page execute read
2EC8000
heap
page read and write
2BBC000
stack
page read and write
3650000
trusted library allocation
page read and write
141E000
heap
page read and write
2A6528CF000
heap
page read and write
1709000
heap
page read and write
2A6528E5000
heap
page read and write
E8E26FF000
stack
page read and write
ED4000
heap
page read and write
48FF000
stack
page read and write
1102000
heap
page read and write
19B0000
heap
page read and write
2A6528B0000
heap
page read and write
1CA0000
trusted library allocation
page read and write
3DC1000
heap
page read and write
3B11000
heap
page read and write
2FCB000
heap
page read and write
E8E23FF000
stack
page read and write
1CA0000
trusted library allocation
page read and write
3B11000
heap
page read and write
2EC000
stack
page read and write
2ECD000
heap
page read and write
3650000
trusted library allocation
page read and write
2FDD000
heap
page read and write
4070000
trusted library allocation
page read and write
3B11000
heap
page read and write
408000
unkown
page readonly
3A9000
unkown
page readonly
1437000
heap
page read and write
45BF000
stack
page read and write
DFE000
stack
page read and write
4240000
trusted library allocation
page read and write
2A6528F9000
heap
page read and write
3B11000
heap
page read and write
2EBB000
heap
page read and write
2F98000
heap
page read and write
4D8F000
stack
page read and write
549000
heap
page read and write
1614000
heap
page read and write
2860000
heap
page read and write
1104000
heap
page read and write
3B11000
heap
page read and write
2E76000
heap
page read and write
12B4000
heap
page read and write
7BE000
stack
page read and write
E1D000
stack
page read and write
A39000
stack
page read and write
2BFF000
unkown
page read and write
2EBE000
heap
page read and write
31EA000
heap
page read and write
3B11000
heap
page read and write
3967000
trusted library allocation
page read and write
3A9000
unkown
page readonly
40B0000
trusted library allocation
page read and write
2FBC000
heap
page read and write
ED4000
heap
page read and write
30A7000
heap
page read and write
3B11000
heap
page read and write
32C000
stack
page read and write
3B11000
heap
page read and write
3A0000
unkown
page write copy
2FB2000
heap
page read and write
9B6000
heap
page read and write
12B4000
heap
page read and write
489000
unkown
page readonly
1726000
heap
page read and write
70E000
stack
page read and write
3300000
heap
page read and write
2A6528CE000
heap
page read and write
2FCF000
heap
page read and write
3B11000
heap
page read and write
2A6528ED000
heap
page read and write
2A654410000
heap
page read and write
12B4000
heap
page read and write
221F000
stack
page read and write
450000
unkown
page readonly
7F8000
heap
page read and write
67E000
stack
page read and write
E8E29FF000
stack
page read and write
2E0000
unkown
page readonly
1CFA000
heap
page read and write
12B4000
heap
page read and write
2A6528F5000
heap
page read and write
3650000
trusted library allocation
page read and write
2E70000
heap
page read and write
370000
unkown
page readonly
99E000
stack
page read and write
1240000
heap
page read and write
B2F000
stack
page read and write
3A0000
heap
page read and write
3B11000
heap
page read and write
770000
heap
page read and write
4ECE000
stack
page read and write
3D0000
heap
page read and write
13FB000
heap
page read and write
316F000
heap
page read and write
3C0000
unkown
page readonly
41E000
unkown
page read and write
1CA0000
trusted library allocation
page read and write
3C0000
unkown
page readonly
2110000
heap
page read and write
12B4000
heap
page read and write
1CA0000
trusted library allocation
page read and write
2E6E000
stack
page read and write
2CFF000
stack
page read and write
143D000
heap
page read and write
2370000
heap
page read and write
3090000
heap
page read and write
417D000
trusted library allocation
page read and write
2A6528BF000
heap
page read and write
3DC0000
heap
page read and write
2CE0000
heap
page read and write
2D32000
heap
page read and write
ED4000
heap
page read and write
231E000
stack
page read and write
12B4000
heap
page read and write
ED4000
heap
page read and write
E0D000
stack
page read and write
28C0000
heap
page read and write
2FDD000
heap
page read and write
2A6542A0000
heap
page read and write
10A0000
heap
page read and write
6D0000
heap
page read and write
3B11000
heap
page read and write
7080000
trusted library allocation
page read and write
520000
heap
page read and write
3B11000
heap
page read and write
2A652AAC000
heap
page read and write
576000
heap
page read and write
3B11000
heap
page read and write
3650000
trusted library allocation
page read and write
3B11000
heap
page read and write
15CF000
heap
page read and write
3B11000
heap
page read and write
16D9000
heap
page read and write
12B4000
heap
page read and write
2EBF000
heap
page read and write
3650000
trusted library allocation
page read and write
ED4000
heap
page read and write
3B11000
heap
page read and write
136C000
heap
page read and write
2A6528AB000
heap
page read and write
31E0000
heap
page read and write
4E4E000
stack
page read and write
1CA0000
trusted library allocation
page read and write
48BE000
stack
page read and write
2A6528B0000
heap
page read and write
38E0000
heap
page read and write
2A6528F2000
heap
page read and write
401000
unkown
page execute read
12B4000
heap
page read and write
3DC1000
heap
page read and write
E8E1F4A000
stack
page read and write
3C1000
unkown
page execute read
2FDD000
heap
page read and write
2A6528F9000
heap
page read and write
3959000
trusted library allocation
page read and write
2FD8000
heap
page read and write
12B4000
heap
page read and write
2E1000
unkown
page execute read
456F000
stack
page read and write
210E000
stack
page read and write
4232000
trusted library allocation
page read and write
167A000
heap
page read and write
12B4000
heap
page read and write
12B4000
heap
page read and write
13AB000
heap
page read and write
496E000
stack
page read and write
2E88000
heap
page read and write
2EBB000
heap
page read and write
ED4000
heap
page read and write
2A6E000
stack
page read and write
56E000
heap
page read and write
12B0000
heap
page read and write
401000
unkown
page execute read
2A6528DE000
heap
page read and write
2DC6000
heap
page read and write
1CA0000
trusted library allocation
page read and write
2A6528F2000
heap
page read and write
2FCB000
heap
page read and write
3B11000
heap
page read and write
10C8000
heap
page read and write
E8E22FF000
stack
page read and write
3DC1000
heap
page read and write
3B11000
heap
page read and write
408000
unkown
page readonly
2A6528E3000
heap
page read and write
4F70000
heap
page read and write
3B11000
heap
page read and write
2D9F000
stack
page read and write
3DC1000
heap
page read and write
3DC1000
heap
page read and write
30A0000
heap
page read and write
3304000
heap
page read and write
3B11000
heap
page read and write
3650000
trusted library allocation
page read and write
2A6528E3000
heap
page read and write
40A000
unkown
page read and write
3B11000
heap
page read and write
2F8F000
stack
page read and write
1737000
heap
page read and write
480000
unkown
page write copy
3B11000
heap
page read and write
2A6528E5000
heap
page read and write
2A652898000
heap
page read and write
2FCB000
heap
page read and write
1373000
heap
page read and write
2E9F000
heap
page read and write
4DCE000
stack
page read and write
3DC1000
heap
page read and write
2EAD000
heap
page read and write
12B4000
heap
page read and write
6F5000
heap
page read and write
10F2000
heap
page read and write
3DC4000
heap
page read and write
2D30000
heap
page read and write
2A6528F9000
heap
page read and write
1CA0000
trusted library allocation
page read and write
2FCE000
heap
page read and write
3B11000
heap
page read and write
12B4000
heap
page read and write
1040000
heap
page read and write
2CAC000
stack
page read and write
2A6528E3000
heap
page read and write
480000
unkown
page read and write
E3C000
stack
page read and write
24FD000
stack
page read and write
3B11000
heap
page read and write
2B6F000
stack
page read and write
11AB000
heap
page read and write
3A0000
unkown
page read and write
2ECD000
heap
page read and write
2A6528E9000
heap
page read and write
15DC000
heap
page read and write
484000
unkown
page write copy
EA0000
heap
page read and write
2B7C000
stack
page read and write
12B4000
heap
page read and write
12B4000
heap
page read and write
3B11000
heap
page read and write
6BE000
stack
page read and write
3B11000
heap
page read and write
11DD000
stack
page read and write
3DC1000
heap
page read and write
2A652890000
heap
page read and write
14A1000
heap
page read and write
2E4E000
stack
page read and write
2ECD000
heap
page read and write
2A652730000
heap
page read and write
2A6528FE000
heap
page read and write
3260000
heap
page read and write
3B11000
heap
page read and write
3DC1000
heap
page read and write
B8A000
stack
page read and write
2A6528EF000
heap
page read and write
1102000
heap
page read and write
476000
unkown
page readonly
2EC7000
heap
page read and write
9B000
stack
page read and write
2BAC000
stack
page read and write
2A652AA0000
heap
page read and write
1340000
trusted library allocation
page read and write
2A6528DD000
heap
page read and write
2FD9000
heap
page read and write
432000
unkown
page read and write
2DA0000
heap
page read and write
4F0F000
stack
page read and write
12B4000
heap
page read and write
169A000
heap
page read and write
40A000
unkown
page write copy
1741000
heap
page read and write
2A6528F9000
heap
page read and write
3DD0000
heap
page read and write
4FD000
unkown
page readonly
2A652AA5000
heap
page read and write
1CA0000
trusted library allocation
page read and write
1280000
heap
page read and write
2FD7000
heap
page read and write
3DC1000
heap
page read and write
3DC1000
heap
page read and write
41BF000
stack
page read and write
11FC000
stack
page read and write
74F000
stack
page read and write
1384000
heap
page read and write
2A6528E5000
heap
page read and write
E8E27FF000
stack
page read and write
2FBD000
heap
page read and write
53A000
heap
page read and write
E8E28FF000
stack
page read and write
25FE000
stack
page read and write
12B4000
heap
page read and write
2D40000
heap
page read and write
29FE000
stack
page read and write
3650000
trusted library allocation
page read and write
2CAC000
stack
page read and write
4DCE000
stack
page read and write
3B11000
heap
page read and write
2A652810000
heap
page read and write
12B4000
heap
page read and write
1621000
heap
page read and write
1CA0000
trusted library allocation
page read and write
1CA0000
trusted library allocation
page read and write
58E000
heap
page read and write
3650000
trusted library allocation
page read and write
396000
unkown
page readonly
12B4000
heap
page read and write
12B4000
heap
page read and write
2FDA000
heap
page read and write
3A4000
unkown
page write copy
2ECD000
heap
page read and write
1CDE000
stack
page read and write
3999000
heap
page read and write
2A6528F1000
heap
page read and write
3B11000
heap
page read and write
368E000
stack
page read and write
117B000
heap
page read and write
6F0000
heap
page read and write
4D4E000
stack
page read and write
510000
heap
page read and write
12B4000
heap
page read and write
3B10000
heap
page read and write
16A6000
heap
page read and write
7F0000
heap
page read and write
450000
unkown
page readonly
2E0000
unkown
page readonly
ED4000
heap
page read and write
19A000
stack
page read and write
ED4000
heap
page read and write
28CC000
heap
page read and write
10E3000
heap
page read and write
3DC1000
heap
page read and write
2FDD000
heap
page read and write
1208000
heap
page read and write
308E000
stack
page read and write
11CF000
stack
page read and write
12B4000
heap
page read and write
370000
unkown
page readonly
12B4000
heap
page read and write
12B4000
heap
page read and write
3B11000
heap
page read and write
2A6528F2000
heap
page read and write
3B11000
heap
page read and write
38A4000
trusted library allocation
page read and write
4F40000
heap
page read and write
2A6528EC000
heap
page read and write
1CA0000
trusted library allocation
page read and write
3B11000
heap
page read and write
12B4000
heap
page read and write
4E0F000
stack
page read and write
BF0000
heap
page read and write
530000
heap
page read and write
2F90000
heap
page read and write
2D5E000
stack
page read and write
12B4000
heap
page read and write
2A6528B8000
heap
page read and write
3B11000
heap
page read and write
12B4000
heap
page read and write
1102000
heap
page read and write
3DC1000
heap
page read and write
476000
unkown
page readonly
1CF5000
heap
page read and write
3650000
trusted library allocation
page read and write
9B0000
heap
page read and write
3650000
trusted library allocation
page read and write
36CE000
stack
page read and write
2A6528F9000
heap
page read and write
2A6528C5000
heap
page read and write
3984000
heap
page read and write
3DC1000
heap
page read and write
2D10000
heap
page read and write
3650000
trusted library allocation
page read and write
4E60000
heap
page read and write
1CA0000
trusted library allocation
page read and write
2A6528BE000
heap
page read and write
2EBB000
heap
page read and write
400000
unkown
page readonly
2A6528F9000
heap
page read and write
3B11000
heap
page read and write
146B000
heap
page read and write
2FDD000
heap
page read and write
3B11000
heap
page read and write
2A20000
heap
page read and write
3DD4000
heap
page read and write
12B4000
heap
page read and write
1CA0000
trusted library allocation
page read and write
140E000
heap
page read and write
2A6528F9000
heap
page read and write
2FAF000
heap
page read and write
2E20000
heap
page read and write
1358000
heap
page read and write
2A6528C4000
heap
page read and write
4C4000
unkown
page read and write
4D0F000
stack
page read and write
129C000
heap
page read and write
3650000
trusted library allocation
page read and write
2E1000
unkown
page execute read
3980000
heap
page read and write
1350000
heap
page read and write
1271000
heap
page read and write
20CF000
stack
page read and write
16BA000
heap
page read and write
2A6528C5000
heap
page read and write
10C0000
heap
page read and write
12ED000
heap
page read and write
3B11000
heap
page read and write
1CF0000
heap
page read and write
119A000
heap
page read and write
12B4000
heap
page read and write
28B0000
heap
page read and write
3268000
heap
page read and write
2C6C000
stack
page read and write
400000
unkown
page readonly
2FDD000
heap
page read and write
1CA0000
trusted library allocation
page read and write
4E8F000
stack
page read and write
1CA0000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
EB0000
heap
page read and write
4E30000
heap
page read and write
1300000
heap
page read and write
393E000
stack
page read and write
4FD000
unkown
page readonly
E8E25FE000
stack
page read and write
2E0E000
stack
page read and write
There are 445 hidden memdumps, click here to show them.