IOC Report
BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c3geqewl.mfc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j0yy3yb5.33l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ti0ec2vn.jab.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xm4obhw3.kei.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe
"C:\Users\user\Desktop\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe"
malicious
C:\Users\user\Desktop\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe
"C:\Users\user\Desktop\BULK HARVEST - VESSEL PARTICULARS.docx.scr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://beirutrest.com
unknown

Domains

Name
IP
Malicious
beirutrest.com
50.87.144.157
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
50.87.144.157
beirutrest.com
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BULK HARVEST - VESSEL PARTICULARS_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CDC000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
34C9000
trusted library allocation
page read and write
malicious
2CB1000
trusted library allocation
page read and write
malicious
6A6E000
stack
page read and write
8DC000
heap
page read and write
107B000
heap
page read and write
E20000
heap
page read and write
11FE000
stack
page read and write
52F3000
heap
page read and write
EB2000
trusted library allocation
page read and write
1089000
heap
page read and write
625E000
stack
page read and write
2A9E000
trusted library allocation
page read and write
9FF000
stack
page read and write
2CA1000
trusted library allocation
page read and write
F7E000
stack
page read and write
83D0000
heap
page read and write
2B50000
heap
page read and write
465C000
stack
page read and write
842000
heap
page read and write
5898000
trusted library allocation
page read and write
8B4000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
834000
heap
page read and write
69C0000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page execute and read and write
69DE000
stack
page read and write
4AA0000
heap
page read and write
400000
remote allocation
page execute and read and write
4C80000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
577000
stack
page read and write
4C70000
trusted library allocation
page read and write
BEE000
trusted library allocation
page read and write
8AC000
heap
page read and write
2AFC000
stack
page read and write
252E000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
24BF000
stack
page read and write
7F670000
trusted library allocation
page execute and read and write
5270000
heap
page execute and read and write
4A10000
trusted library allocation
page read and write
8DA000
heap
page read and write
99A000
stack
page read and write
B2DC000
stack
page read and write
EA6000
trusted library allocation
page execute and read and write
4EC1000
heap
page read and write
E60000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
B3DC000
stack
page read and write
6E20000
heap
page read and write
4A6B000
stack
page read and write
6528000
heap
page read and write
7E7000
trusted library allocation
page execute and read and write
2CE2000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
B05E000
stack
page read and write
F20000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
827000
heap
page read and write
49B0000
trusted library allocation
page read and write
12D0000
heap
page read and write
B29E000
stack
page read and write
4E60000
trusted library allocation
page execute and read and write
6F30000
heap
page read and write
68B0000
trusted library allocation
page read and write
68C0000
trusted library allocation
page execute and read and write
2A8B000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
69AE000
stack
page read and write
1000000
heap
page read and write
2AAD000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
4EA0000
heap
page read and write
68D0000
trusted library allocation
page execute and read and write
C10000
heap
page read and write
7D2000
trusted library allocation
page read and write
74E000
stack
page read and write
52E0000
heap
page read and write
4AB3000
heap
page read and write
6BEF000
stack
page read and write
7DA000
trusted library allocation
page execute and read and write
B19E000
stack
page read and write
7D6000
trusted library allocation
page execute and read and write
7C3000
trusted library allocation
page read and write
B90000
trusted library allocation
page execute and read and write
1034000
heap
page read and write
587E000
stack
page read and write
7B0000
trusted library allocation
page read and write
6A1D000
stack
page read and write
6F2F000
stack
page read and write
675E000
stack
page read and write
671E000
stack
page read and write
ED0000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
4C5E000
stack
page read and write
BC0000
trusted library allocation
page read and write
BB0000
heap
page read and write
4C60000
trusted library allocation
page read and write
108C000
heap
page read and write
6890000
trusted library allocation
page read and write
AEDE000
stack
page read and write
7E2000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
89C000
heap
page read and write
44C8000
trusted library allocation
page read and write
102A000
heap
page read and write
EA2000
trusted library allocation
page read and write
479000
stack
page read and write
80B000
heap
page read and write
4D10000
heap
page read and write
E85000
heap
page read and write
4E90000
heap
page read and write
24C1000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
661E000
stack
page read and write
E90000
trusted library allocation
page read and write
6D92000
trusted library allocation
page read and write
4E5E000
stack
page read and write
4E80000
heap
page read and write
EA0000
trusted library allocation
page read and write
AF1E000
stack
page read and write
2C9F000
trusted library allocation
page read and write
BA0000
heap
page execute and read and write
49D0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page execute and read and write
685E000
stack
page read and write
ABCE000
stack
page read and write
78E000
stack
page read and write
6B20000
trusted library section
page read and write
69B7000
trusted library allocation
page read and write
BFD000
trusted library allocation
page read and write
80E000
heap
page read and write
6C8D000
stack
page read and write
69B0000
trusted library allocation
page read and write
696F000
stack
page read and write
675E000
stack
page read and write
2538000
trusted library allocation
page read and write
6C20000
heap
page read and write
F37000
heap
page read and write
B8B000
stack
page read and write
6867000
trusted library allocation
page read and write
EBB000
trusted library allocation
page execute and read and write
685E000
stack
page read and write
49C5000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
2C5E000
stack
page read and write
FBE000
stack
page read and write
EB5000
trusted library allocation
page execute and read and write
52F0000
heap
page read and write
6C30000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
E7D000
trusted library allocation
page execute and read and write
8427000
heap
page read and write
2CF0000
trusted library allocation
page read and write
68DE000
stack
page read and write
B3F0000
trusted library allocation
page read and write
4CE0000
heap
page read and write
4CD0000
heap
page read and write
E1E000
stack
page read and write
58A0000
trusted library allocation
page read and write
83F000
heap
page read and write
E73000
trusted library allocation
page execute and read and write
BDB000
trusted library allocation
page read and write
563C000
stack
page read and write
C17000
heap
page read and write
2C97000
trusted library allocation
page read and write
B4E000
stack
page read and write
EE0000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
EF0000
trusted library allocation
page read and write
5300000
heap
page read and write
34C1000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
ACCE000
stack
page read and write
142000
unkown
page readonly
4D5E000
stack
page read and write
12D7000
heap
page read and write
E80000
heap
page read and write
6870000
trusted library allocation
page execute and read and write
800000
heap
page read and write
10D2000
heap
page read and write
83E2000
heap
page read and write
5E0000
heap
page read and write
2C61000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
1208000
trusted library allocation
page read and write
790000
heap
page read and write
6B6E000
stack
page read and write
2CAD000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
4AB0000
heap
page read and write
4E20000
trusted library allocation
page execute and read and write
3CCC000
trusted library allocation
page read and write
BF6000
trusted library allocation
page read and write
F00000
heap
page execute and read and write
12A0000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
8412000
heap
page read and write
10C9000
heap
page read and write
2CD8000
trusted library allocation
page read and write
AFE000
stack
page read and write
CF9000
stack
page read and write
140000
unkown
page readonly
F10000
trusted library allocation
page read and write
101E000
heap
page read and write
7CD000
trusted library allocation
page execute and read and write
4D15000
heap
page read and write
E70000
trusted library allocation
page read and write
4A80000
trusted library allocation
page execute and read and write
7B4000
trusted library allocation
page read and write
BF1000
trusted library allocation
page read and write
4A00000
heap
page execute and read and write
4CC0000
trusted library section
page readonly
49C0000
trusted library allocation
page read and write
EB7000
trusted library allocation
page execute and read and write
6BF0000
trusted library allocation
page read and write
109C000
heap
page read and write
7BD000
trusted library allocation
page execute and read and write
2CDA000
trusted library allocation
page read and write
68AD000
stack
page read and write
2CD6000
trusted library allocation
page read and write
64E0000
heap
page read and write
EAA000
trusted library allocation
page execute and read and write
5060000
trusted library allocation
page read and write
7EB000
trusted library allocation
page execute and read and write
6620000
heap
page read and write
1036000
heap
page read and write
630000
heap
page read and write
ADDE000
stack
page read and write
B01E000
stack
page read and write
1008000
heap
page read and write
7B3000
trusted library allocation
page execute and read and write
3C89000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5040000
trusted library section
page read and write
6896000
trusted library allocation
page read and write
6BAE000
stack
page read and write
B15F000
stack
page read and write
FFC000
stack
page read and write
F30000
heap
page read and write
There are 240 hidden memdumps, click here to show them.