IOC Report
NEW ORDER.exe

loading gif

Files

File Path
Type
Category
Malicious
NEW ORDER.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Bactris
data
dropped
C:\Users\user\AppData\Local\Temp\Prober
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autDE75.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autDEB4.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NEW ORDER.exe
"C:\Users\user\Desktop\NEW ORDER.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\NEW ORDER.exe"
malicious

URLs

Name
IP
Malicious
http://ip-api.com/line/?fields=hostingS
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
3670000
direct allocation
page read and write
malicious
5290000
heap
page read and write
F54000
heap
page read and write
14D0000
trusted library allocation
page read and write
F28000
heap
page read and write
C61000
heap
page read and write
1490000
trusted library allocation
page read and write
EE9000
heap
page read and write
C45000
heap
page read and write
566E000
stack
page read and write
1142000
trusted library allocation
page read and write
F20000
heap
page read and write
482000
unkown
page readonly
57AD000
stack
page read and write
39CD000
direct allocation
page read and write
E2F000
heap
page read and write
2EC6000
trusted library allocation
page read and write
6081000
heap
page read and write
1113000
trusted library allocation
page execute and read and write
1160000
trusted library allocation
page read and write
526E000
trusted library allocation
page read and write
3850000
direct allocation
page read and write
3DF9000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
13F8000
trusted library allocation
page read and write
111E000
stack
page read and write
562F000
stack
page read and write
64BE000
stack
page read and write
1130000
trusted library allocation
page read and write
494000
unkown
page readonly
3700000
direct allocation
page read and write
3823000
direct allocation
page read and write
F3E000
heap
page read and write
F05000
heap
page read and write
5282000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
397D000
direct allocation
page read and write
39EE000
direct allocation
page read and write
C47000
heap
page read and write
BE9000
stack
page read and write
14C0000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
3C0000
unkown
page readonly
2E9C000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
1132000
trusted library allocation
page read and write
494000
unkown
page readonly
D05000
heap
page read and write
113A000
trusted library allocation
page execute and read and write
3C1000
unkown
page execute read
3A3E000
direct allocation
page read and write
2DD1000
trusted library allocation
page read and write
FEA000
heap
page read and write
1000000
heap
page read and write
1120000
trusted library allocation
page read and write
39C9000
direct allocation
page read and write
F92000
heap
page read and write
5F0000
heap
page read and write
3E40000
trusted library allocation
page read and write
E52000
heap
page read and write
EFB000
heap
page read and write
2D8E000
stack
page read and write
6670000
heap
page read and write
2E46000
trusted library allocation
page read and write
D24000
heap
page read and write
482000
unkown
page readonly
CD0000
heap
page read and write
39EE000
direct allocation
page read and write
1147000
trusted library allocation
page execute and read and write
C8C000
heap
page read and write
FF4000
heap
page read and write
36B0000
direct allocation
page read and write
38A0000
direct allocation
page read and write
3320000
heap
page read and write
FB4000
heap
page read and write
2EDE000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
2EEC000
trusted library allocation
page read and write
114B000
trusted library allocation
page execute and read and write
2EF2000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
4E0C000
stack
page read and write
E25000
heap
page read and write
1A50000
heap
page read and write
BEF000
stack
page read and write
1110000
trusted library allocation
page read and write
4F0D000
stack
page read and write
5276000
trusted library allocation
page read and write
53D3000
heap
page read and write
37D3000
direct allocation
page read and write
3979000
direct allocation
page read and write
3850000
direct allocation
page read and write
C2B000
heap
page read and write
11D0000
trusted library allocation
page execute and read and write
53D0000
heap
page read and write
CA6000
heap
page read and write
3A3E000
direct allocation
page read and write
39C9000
direct allocation
page read and write
607E000
heap
page read and write
36B0000
direct allocation
page read and write
5262000
trusted library allocation
page read and write
6074000
heap
page read and write
14E6000
heap
page read and write
6060000
heap
page read and write
63BE000
stack
page read and write
155E000
stack
page read and write
D5F000
heap
page read and write
36B0000
direct allocation
page read and write
3979000
direct allocation
page read and write
6620000
trusted library allocation
page read and write
11AE000
stack
page read and write
39C9000
direct allocation
page read and write
38A0000
direct allocation
page read and write
3700000
direct allocation
page read and write
CD5000
heap
page read and write
58AF000
stack
page read and write
64FE000
stack
page read and write
1A40000
heap
page read and write
397D000
direct allocation
page read and write
E50000
heap
page read and write
C51000
heap
page read and write
3C0000
unkown
page readonly
2ECA000
trusted library allocation
page read and write
5E0000
heap
page read and write
D99000
heap
page read and write
6607000
trusted library allocation
page read and write
F4A000
heap
page read and write
6630000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
CE5000
heap
page read and write
3C1000
unkown
page execute read
604E000
heap
page read and write
D6E000
heap
page read and write
6640000
trusted library allocation
page execute and read and write
7FD20000
trusted library allocation
page execute and read and write
3DD9000
trusted library allocation
page read and write
DB6000
heap
page read and write
3823000
direct allocation
page read and write
2ECC000
trusted library allocation
page read and write
3DD1000
trusted library allocation
page read and write
57A000
stack
page read and write
39CD000
direct allocation
page read and write
54DC000
stack
page read and write
CEF000
heap
page read and write
48C000
unkown
page read and write
11E0000
heap
page read and write
552E000
stack
page read and write
490000
unkown
page write copy
C00000
heap
page read and write
11B0000
heap
page read and write
112D000
trusted library allocation
page execute and read and write
5256000
trusted library allocation
page read and write
151E000
stack
page read and write
2DC0000
heap
page read and write
43E000
system
page execute and read and write
397D000
direct allocation
page read and write
576E000
stack
page read and write
14E0000
heap
page read and write
5980000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
CF0000
heap
page read and write
2ED9000
trusted library allocation
page read and write
38A0000
direct allocation
page read and write
14B0000
heap
page execute and read and write
53CC000
stack
page read and write
C18000
heap
page read and write
AEA000
stack
page read and write
F56000
heap
page read and write
525E000
trusted library allocation
page read and write
BCE000
stack
page read and write
EA0000
heap
page read and write
37D3000
direct allocation
page read and write
BBE000
stack
page read and write
CE5000
heap
page read and write
45C000
unkown
page readonly
5960000
heap
page read and write
400000
system
page execute and read and write
3300000
direct allocation
page execute and read and write
F24000
heap
page read and write
3700000
direct allocation
page read and write
6610000
trusted library allocation
page read and write
CA6000
heap
page read and write
BDB000
stack
page read and write
3324000
heap
page read and write
5970000
trusted library allocation
page read and write
C51000
heap
page read and write
CC5000
heap
page read and write
C10000
heap
page read and write
195E000
stack
page read and write
48C000
unkown
page write copy
65FE000
stack
page read and write
3979000
direct allocation
page read and write
37D3000
direct allocation
page read and write
2EBC000
trusted library allocation
page read and write
CD2000
heap
page read and write
3850000
direct allocation
page read and write
6920000
heap
page read and write
6680000
trusted library allocation
page read and write
F00000
heap
page read and write
BFF000
stack
page read and write
3A3E000
direct allocation
page read and write
2E05000
trusted library allocation
page read and write
3823000
direct allocation
page read and write
6040000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
39EE000
direct allocation
page read and write
C4E000
heap
page read and write
526A000
trusted library allocation
page read and write
1136000
trusted library allocation
page execute and read and write
5250000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
5987000
trusted library allocation
page read and write
39CD000
direct allocation
page read and write
45C000
unkown
page readonly
6600000
trusted library allocation
page read and write
There are 207 hidden memdumps, click here to show them.