IOC Report
CuBYV0mfw8.exe

loading gif

Files

File Path
Type
Category
Malicious
CuBYV0mfw8.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CuBYV0mfw8.exe_70db625d245d7948588ef488edce5985f7bd376_dcfdfb87_d7767550-a740-4fe2-a2f8-a0c3d65d08fd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF08.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB003.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB033.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CuBYV0mfw8.exe
"C:\Users\user\Desktop\CuBYV0mfw8.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2284 -s 1060

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112/6.149.112:8888/safekeyj
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112/uf
unknown

Domains

Name
IP
Malicious
56.126.166.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
ProgramId
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
FileId
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
LowerCaseLongPath
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
LongPathHash
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Name
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
OriginalFileName
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Publisher
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Version
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
BinFileVersion
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
BinaryType
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
ProductName
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
ProductVersion
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
LinkDate
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
BinProductVersion
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
AppxPackageFullName
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
AppxPackageRelativeId
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Size
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Language
\REGISTRY\A\{da6a7da5-047f-248c-de15-8ca98a9b1f28}\Root\InventoryApplicationFile\cubyv0mfw8.exe|f3cf3a72a732c533
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18C211A000
stack
page read and write
1EB6DA65000
heap
page read and write
1EB6D950000
heap
page read and write
7FF6670B0000
unkown
page readonly
18C2CFD000
stack
page read and write
18C26FE000
stack
page read and write
7FF6670B1000
unkown
page execute read
18C2BF8000
stack
page read and write
1EB6D8B4000
heap
page read and write
7FF6670B2000
unkown
page readonly
7FF6670B2000
unkown
page readonly
18C24FE000
stack
page read and write
1EB6D930000
heap
page read and write
1EB6D88A000
heap
page read and write
7FF6670B9000
unkown
page readonly
18C27FE000
stack
page read and write
1EB6D740000
heap
page read and write
7FF6670B3000
unkown
page execute read
7FF6670B0000
unkown
page readonly
7FF6670B9000
unkown
page readonly
1EB6D83C000
heap
page read and write
18C29FF000
stack
page read and write
1EB6D830000
heap
page read and write
18C2AFD000
stack
page read and write
7FF6670B1000
unkown
page execute read
1EB6D8AA000
heap
page read and write
18C25FF000
stack
page read and write
1EB6DA60000
heap
page read and write
18C28FF000
stack
page read and write
There are 19 hidden memdumps, click here to show them.