IOC Report
shipping documents.exe

loading gif

Files

File Path
Type
Category
Malicious
shipping documents.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\nonplacental
data
dropped
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\shipping documents.exe
"C:\Users\user\Desktop\shipping documents.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\shipping documents.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://mail.naveentour.com
unknown

Domains

Name
IP
Malicious
mail.naveentour.com
162.214.80.31
malicious

IPs

IP
Domain
Country
Malicious
162.214.80.31
mail.naveentour.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
30E2000
trusted library allocation
page read and write
malicious
3091000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2FE0000
direct allocation
page read and write
malicious
30EA000
trusted library allocation
page read and write
malicious
3F36000
heap
page read and write
6CD0000
heap
page read and write
3EF1000
heap
page read and write
5BE0000
trusted library allocation
page read and write
400000
unkown
page readonly
43CC000
heap
page read and write
3F6F000
heap
page read and write
3ED0000
heap
page read and write
47A9000
direct allocation
page read and write
1100000
trusted library allocation
page read and write
542E000
stack
page read and write
3EC6000
heap
page read and write
47A9000
direct allocation
page read and write
53EF000
stack
page read and write
1155000
heap
page read and write
65D7000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
143F000
stack
page read and write
44E0000
direct allocation
page read and write
10E0000
trusted library allocation
page read and write
9E0000
heap
page read and write
47AD000
direct allocation
page read and write
4603000
direct allocation
page read and write
51E0000
heap
page execute and read and write
1330000
heap
page read and write
5552000
trusted library allocation
page read and write
3E86000
heap
page read and write
3CD1000
trusted library allocation
page read and write
3EF1000
heap
page read and write
4680000
direct allocation
page read and write
2FDE000
stack
page read and write
CFA000
stack
page read and write
1120000
trusted library allocation
page read and write
12C3000
trusted library allocation
page execute and read and write
10E7000
trusted library allocation
page execute and read and write
2F31000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
3F40000
heap
page read and write
1277000
heap
page read and write
43E000
system
page execute and read and write
401000
unkown
page execute and read and write
656C000
trusted library allocation
page read and write
1B0000
heap
page read and write
19E000
stack
page read and write
12D4000
trusted library allocation
page read and write
2FEC000
heap
page read and write
2EF6000
heap
page read and write
116E000
stack
page read and write
1130000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
37EE000
stack
page read and write
552B000
trusted library allocation
page read and write
1000000
heap
page read and write
44E0000
direct allocation
page read and write
5510000
trusted library allocation
page read and write
3F6E000
heap
page read and write
1820000
heap
page read and write
3EF1000
heap
page read and write
47A9000
direct allocation
page read and write
6580000
trusted library allocation
page execute and read and write
53E0000
trusted library allocation
page execute and read and write
1098000
heap
page read and write
4603000
direct allocation
page read and write
6CE0000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
10A0000
trusted library allocation
page read and write
3E82000
heap
page read and write
47AD000
direct allocation
page read and write
3F4C000
heap
page read and write
481E000
direct allocation
page read and write
10B4000
trusted library allocation
page read and write
3F6E000
heap
page read and write
10CD000
trusted library allocation
page execute and read and write
1330000
trusted library allocation
page execute and read and write
6547000
trusted library allocation
page read and write
3F38000
heap
page read and write
66C0000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
1350000
heap
page read and write
44E0000
direct allocation
page read and write
1490000
heap
page read and write
3EF1000
heap
page read and write
1310000
trusted library allocation
page read and write
4F6C000
stack
page read and write
8D2000
unkown
page readonly
2BC0000
heap
page execute and read and write
51CE000
stack
page read and write
4603000
direct allocation
page read and write
100000
heap
page read and write
10C0000
trusted library allocation
page read and write
4091000
trusted library allocation
page read and write
65CD000
stack
page read and write
4603000
direct allocation
page read and write
5560000
trusted library allocation
page read and write
1140000
heap
page read and write
1450000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
5BDE000
stack
page read and write
4B1000
unkown
page execute and read and write
D99000
stack
page read and write
55B0000
heap
page execute and read and write
3EF1000
heap
page read and write
90E000
stack
page read and write
6560000
trusted library allocation
page read and write
3DEF000
heap
page read and write
104E000
heap
page read and write
3BF0000
heap
page read and write
109F000
stack
page read and write
3EF1000
heap
page read and write
595F000
stack
page read and write
2EB0000
trusted library allocation
page execute and read and write
11E8000
heap
page read and write
E9E000
stack
page read and write
E5E000
stack
page read and write
666F000
stack
page read and write
9D0000
heap
page read and write
3E76000
heap
page read and write
2E60000
trusted library allocation
page read and write
10EB000
trusted library allocation
page execute and read and write
55AE000
stack
page read and write
2E4B000
trusted library allocation
page execute and read and write
518E000
stack
page read and write
3F6C000
heap
page read and write
3DDC000
heap
page read and write
477000
unkown
page execute and write copy
3BEF000
stack
page read and write
1239000
heap
page read and write
3E76000
heap
page read and write
44E0000
direct allocation
page read and write
481E000
direct allocation
page read and write
2ED0000
heap
page read and write
30F6000
trusted library allocation
page read and write
3EF1000
heap
page read and write
2E42000
trusted library allocation
page read and write
47AD000
direct allocation
page read and write
481E000
direct allocation
page read and write
3CF0000
heap
page read and write
124F000
stack
page read and write
3E38000
heap
page read and write
10C4000
trusted library allocation
page read and write
9A000
stack
page read and write
3EB7000
heap
page read and write
2EC0000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
4BA000
unkown
page read and write
3DE6000
heap
page read and write
1160000
heap
page read and write
571F000
stack
page read and write
DC9000
stack
page read and write
3F6D000
heap
page read and write
1C0000
heap
page read and write
50CC000
stack
page read and write
6540000
trusted library allocation
page read and write
552F000
stack
page read and write
47A9000
direct allocation
page read and write
1486000
trusted library allocation
page execute and read and write
94E000
stack
page read and write
2E47000
trusted library allocation
page execute and read and write
1453000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
128E000
stack
page read and write
4603000
direct allocation
page read and write
3F6F000
heap
page read and write
552E000
trusted library allocation
page read and write
1030000
heap
page read and write
11AE000
stack
page read and write
3EF1000
heap
page read and write
3EF1000
heap
page read and write
D20000
heap
page read and write
3EF1000
heap
page read and write
481E000
direct allocation
page read and write
3EC7000
heap
page execute and read and write
2EE5000
heap
page read and write
55FC000
stack
page read and write
51CE000
stack
page read and write
3EF1000
heap
page read and write
3E76000
heap
page read and write
3EF1000
heap
page read and write
1059000
heap
page read and write
D96000
heap
page read and write
12B0000
trusted library allocation
page read and write
12DD000
trusted library allocation
page execute and read and write
4DCD000
stack
page read and write
3F66000
heap
page read and write
148A000
trusted library allocation
page execute and read and write
2EFF000
stack
page read and write
3F6F000
heap
page read and write
42FB000
heap
page read and write
3F6E000
heap
page read and write
3EF1000
heap
page read and write
66AE000
stack
page read and write
47AD000
direct allocation
page read and write
4680000
direct allocation
page read and write
D28000
heap
page read and write
506E000
stack
page read and write
3F01000
heap
page read and write
490000
unkown
page execute and read and write
7FDF0000
trusted library allocation
page execute and read and write
553A000
trusted library allocation
page read and write
3C8D000
heap
page read and write
3E85000
heap
page read and write
1440000
trusted library allocation
page read and write
12F7000
trusted library allocation
page execute and read and write
1065000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
2D2E000
stack
page read and write
12CC000
stack
page read and write
2F10000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
11E5000
heap
page read and write
2F00000
trusted library allocation
page read and write
8BF000
stack
page read and write
3EF1000
heap
page read and write
6300000
heap
page read and write
17F0000
heap
page read and write
2E45000
trusted library allocation
page execute and read and write
2FE8000
trusted library allocation
page read and write
97A000
heap
page read and write
40B9000
trusted library allocation
page read and write
10B3000
trusted library allocation
page execute and read and write
128C000
heap
page read and write
66B0000
trusted library allocation
page read and write
2DF0000
heap
page read and write
97E000
heap
page read and write
3EF1000
heap
page read and write
30A0000
heap
page read and write
D57000
heap
page read and write
52EE000
stack
page read and write
2DD0000
heap
page read and write
8D0000
unkown
page readonly
110000
heap
page read and write
1300000
heap
page read and write
EC0000
heap
page read and write
3EF0000
heap
page read and write
47AD000
direct allocation
page read and write
585E000
stack
page read and write
2CCE000
stack
page read and write
4B8000
unkown
page execute and write copy
EC5000
heap
page read and write
4680000
direct allocation
page read and write
1400000
heap
page read and write
D4A000
heap
page read and write
6CF0000
heap
page read and write
3BF1000
heap
page read and write
686E000
stack
page read and write
153F000
stack
page read and write
11B0000
heap
page read and write
96C000
stack
page read and write
5570000
trusted library allocation
page read and write
3F6E000
heap
page read and write
11B0000
heap
page read and write
400000
system
page execute and read and write
55EE000
stack
page read and write
123F000
stack
page read and write
2CD1000
trusted library allocation
page read and write
1482000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
1470000
heap
page read and write
3E76000
heap
page read and write
1150000
heap
page read and write
575E000
stack
page read and write
3F6E000
heap
page read and write
1454000
trusted library allocation
page read and write
3F6F000
heap
page read and write
3ED0000
heap
page read and write
970000
heap
page read and write
44E0000
direct allocation
page read and write
8DA000
unkown
page readonly
2EE0000
heap
page read and write
D43000
heap
page read and write
481E000
direct allocation
page read and write
6550000
trusted library allocation
page read and write
D3E000
heap
page read and write
11B5000
heap
page read and write
599E000
stack
page read and write
6570000
trusted library allocation
page execute and read and write
553E000
trusted library allocation
page read and write
15E000
stack
page read and write
1110000
trusted library allocation
page execute and read and write
3E71000
heap
page read and write
5660000
heap
page read and write
5A9E000
stack
page read and write
5653000
heap
page read and write
3EF1000
heap
page read and write
563E000
stack
page read and write
400000
unkown
page readonly
30E0000
trusted library allocation
page read and write
CCA000
stack
page read and write
585C000
stack
page read and write
5520000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
3FE5000
heap
page read and write
47A9000
direct allocation
page read and write
3F31000
trusted library allocation
page read and write
12CD000
trusted library allocation
page execute and read and write
C9C000
stack
page read and write
47A9000
direct allocation
page read and write
3E76000
heap
page read and write
3FE4000
heap
page read and write
12D0000
trusted library allocation
page read and write
30A4000
heap
page read and write
4603000
direct allocation
page read and write
3E81000
heap
page read and write
1540000
heap
page read and write
3F6E000
heap
page read and write
3080000
heap
page execute and read and write
5650000
heap
page read and write
481E000
direct allocation
page read and write
12F0000
trusted library allocation
page read and write
3E1F000
heap
page read and write
2F20000
heap
page execute and read and write
10BD000
trusted library allocation
page execute and read and write
554D000
trusted library allocation
page read and write
12FB000
trusted library allocation
page execute and read and write
5532000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
3ECB000
heap
page read and write
2EAE000
stack
page read and write
44E0000
direct allocation
page read and write
4BA000
unkown
page write copy
54AE000
stack
page read and write
1053000
heap
page read and write
11CE000
heap
page read and write
11DA000
heap
page read and write
9A9000
heap
page read and write
1010000
heap
page read and write
11B8000
heap
page read and write
4A7000
unkown
page execute and read and write
1320000
trusted library allocation
page execute and read and write
12C4000
trusted library allocation
page read and write
3F5E000
heap
page read and write
3DEA000
heap
page read and write
5BE9000
trusted library allocation
page read and write
12AB000
heap
page read and write
3C6E000
heap
page read and write
47AD000
direct allocation
page read and write
163F000
stack
page read and write
5610000
heap
page execute and read and write
1038000
heap
page read and write
40FB000
trusted library allocation
page read and write
3F6E000
heap
page read and write
5ADD000
stack
page read and write
There are 339 hidden memdumps, click here to show them.