IOC Report
shipping documents.exe

loading gif

Files

File Path
Type
Category
Malicious
shipping documents.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Hezron
data
dropped
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\shipping documents.exe
"C:\Users\user\Desktop\shipping documents.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\shipping documents.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://mail.naveentour.com
unknown

Domains

Name
IP
Malicious
mail.naveentour.com
162.214.80.31
malicious

IPs

IP
Domain
Country
Malicious
162.214.80.31
mail.naveentour.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
32C1000
trusted library allocation
page read and write
malicious
3312000
trusted library allocation
page read and write
malicious
331A000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
4000000
heap
page read and write
18D0000
trusted library allocation
page read and write
C30000
heap
page read and write
4512000
heap
page read and write
AF4000
trusted library allocation
page read and write
3F82000
heap
page read and write
4596000
heap
page read and write
4BFE000
stack
page read and write
C20000
heap
page execute and read and write
65A6000
heap
page read and write
4476000
heap
page read and write
67B7000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
7FD50000
trusted library allocation
page execute and read and write
4476000
heap
page read and write
594C000
stack
page read and write
4000000
heap
page read and write
1378000
stack
page read and write
4A7F000
stack
page read and write
1487000
heap
page read and write
3F82000
heap
page read and write
5D0000
heap
page read and write
14C3000
heap
page read and write
48DE000
stack
page read and write
4472000
heap
page read and write
328F000
stack
page read and write
447C000
heap
page read and write
5E0000
heap
page read and write
3F82000
heap
page read and write
57C1000
trusted library allocation
page read and write
3F82000
heap
page read and write
57E0000
trusted library allocation
page read and write
3F82000
heap
page read and write
450D000
heap
page read and write
1880000
heap
page read and write
A44000
trusted library allocation
page read and write
2730000
heap
page read and write
4503000
heap
page read and write
4510000
heap
page read and write
4511000
heap
page read and write
3F82000
heap
page read and write
4479000
heap
page read and write
451B000
heap
page read and write
4473000
heap
page read and write
451E000
heap
page read and write
14F0000
heap
page read and write
4000000
heap
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
32A0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
271C000
stack
page read and write
18F6000
trusted library allocation
page execute and read and write
691E000
stack
page read and write
B7B000
trusted library allocation
page execute and read and write
A6E000
heap
page read and write
4473000
heap
page read and write
77E000
heap
page read and write
3F82000
heap
page read and write
3F82000
heap
page read and write
23B1000
trusted library allocation
page read and write
3180000
heap
page read and write
451A000
heap
page read and write
3F82000
heap
page read and write
2390000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
3F82000
heap
page read and write
1920000
trusted library allocation
page read and write
4504000
heap
page read and write
4000000
heap
page read and write
42C1000
trusted library allocation
page read and write
1E0000
heap
page read and write
5BBE000
stack
page read and write
3F82000
heap
page read and write
18ED000
trusted library allocation
page execute and read and write
3F92000
heap
page read and write
4470000
heap
page read and write
AF3000
trusted library allocation
page execute and read and write
4000000
heap
page read and write
48D0000
trusted library allocation
page execute and read and write
65B0000
heap
page read and write
3BBF000
heap
page read and write
50EF000
stack
page read and write
4473000
heap
page read and write
7CE000
heap
page read and write
3F82000
heap
page read and write
140E000
heap
page read and write
6590000
heap
page read and write
4D2E000
stack
page read and write
57A6000
trusted library allocation
page read and write
4000000
heap
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
71F000
stack
page read and write
400000
system
page execute and read and write
4472000
heap
page read and write
2370000
heap
page read and write
4FA000
stack
page read and write
3F82000
heap
page read and write
67DC000
trusted library allocation
page read and write
451A000
heap
page read and write
4001000
heap
page read and write
4000000
heap
page read and write
447C000
heap
page read and write
4000000
heap
page read and write
4000000
heap
page read and write
447D000
heap
page read and write
5CFE000
stack
page read and write
1902000
trusted library allocation
page read and write
4470000
heap
page read and write
59AE000
stack
page read and write
4BBF000
stack
page read and write
BD0000
heap
page read and write
3F82000
heap
page read and write
3F82000
heap
page read and write
21AE000
stack
page read and write
4478000
heap
page read and write
450C000
heap
page read and write
6920000
trusted library allocation
page read and write
6570000
heap
page read and write
447C000
heap
page read and write
1907000
trusted library allocation
page execute and read and write
447B000
heap
page read and write
3F82000
heap
page read and write
A73000
heap
page read and write
4000000
heap
page read and write
5803000
heap
page read and write
451A000
heap
page read and write
4479000
heap
page read and write
3F82000
heap
page read and write
45A6000
heap
page read and write
57A0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
4519000
heap
page read and write
90000
unkown
page readonly
4000000
heap
page read and write
4000000
heap
page read and write
57B2000
trusted library allocation
page read and write
3F82000
heap
page read and write
3F82000
heap
page read and write
1900000
trusted library allocation
page read and write
451E000
heap
page read and write
4475000
heap
page read and write
4514000
heap
page read and write
450B000
heap
page read and write
3290000
trusted library allocation
page read and write
C1E000
stack
page read and write
447C000
heap
page read and write
580000
heap
page read and write
450D000
heap
page read and write
3F82000
heap
page read and write
2741000
trusted library allocation
page read and write
6FC0000
heap
page read and write
18FA000
trusted library allocation
page execute and read and write
451E000
heap
page read and write
214B000
trusted library allocation
page execute and read and write
4000000
heap
page read and write
4000000
heap
page read and write
43EC000
stack
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
3F68000
heap
page read and write
3F82000
heap
page read and write
7DF000
heap
page read and write
57BE000
trusted library allocation
page read and write
13B0000
heap
page read and write
166A000
heap
page read and write
5D99000
trusted library allocation
page read and write
3F82000
heap
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
4CFE000
stack
page read and write
45A4000
heap
page read and write
127A000
stack
page read and write
190B000
trusted library allocation
page execute and read and write
447E000
heap
page read and write
4000000
heap
page read and write
4514000
heap
page read and write
21B0000
trusted library allocation
page execute and read and write
1425000
heap
page read and write
447B000
heap
page read and write
A50000
heap
page read and write
A30000
trusted library allocation
page read and write
42E9000
trusted library allocation
page read and write
B77000
trusted library allocation
page execute and read and write
1610000
heap
page read and write
4513000
heap
page read and write
4506000
heap
page read and write
4830000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
60E000
stack
page read and write
610000
heap
page read and write
4000000
heap
page read and write
4512000
heap
page read and write
A79000
heap
page read and write
783000
heap
page read and write
A0E000
stack
page read and write
4000000
heap
page read and write
57C6000
trusted library allocation
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
1930000
trusted library allocation
page execute and read and write
4510000
heap
page read and write
4000000
heap
page read and write
92000
unkown
page readonly
3F82000
heap
page read and write
3CAB000
heap
page read and write
740000
heap
page read and write
477000
unkown
page execute and write copy
3F82000
heap
page read and write
1940000
trusted library allocation
page read and write
45A8000
heap
page read and write
95F000
stack
page read and write
14C9000
heap
page read and write
3F82000
heap
page read and write
4EA0000
heap
page execute and read and write
1670000
heap
page read and write
3F82000
heap
page read and write
BB0000
heap
page read and write
4000000
heap
page read and write
447D000
heap
page read and write
4000000
heap
page read and write
67B0000
trusted library allocation
page read and write
4511000
heap
page read and write
4000000
heap
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
1905000
trusted library allocation
page execute and read and write
4519000
heap
page read and write
5810000
heap
page read and write
67D0000
trusted library allocation
page read and write
4476000
heap
page read and write
4471000
heap
page read and write
3741000
trusted library allocation
page read and write
317C000
stack
page read and write
57D2000
trusted library allocation
page read and write
4BA000
unkown
page write copy
4474000
heap
page read and write
4476000
heap
page read and write
4C20000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
BA0000
trusted library allocation
page execute and read and write
8F9000
stack
page read and write
2147000
trusted library allocation
page execute and read and write
59B0000
heap
page execute and read and write
18F0000
trusted library allocation
page read and write
797000
heap
page read and write
14C1000
heap
page read and write
4475000
heap
page read and write
657A000
heap
page read and write
451A000
heap
page read and write
1428000
heap
page read and write
6840000
trusted library allocation
page read and write
451A000
heap
page read and write
4FAE000
stack
page read and write
45AD000
heap
page read and write
4517000
heap
page read and write
3F82000
heap
page read and write
18D4000
trusted library allocation
page read and write
3F82000
heap
page read and write
67C0000
trusted library allocation
page read and write
4000000
heap
page read and write
3F82000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
13B5000
heap
page read and write
14D8000
heap
page read and write
750000
trusted library allocation
page read and write
3F82000
heap
page read and write
78A000
heap
page read and write
A58000
heap
page read and write
18F2000
trusted library allocation
page read and write
AFD000
trusted library allocation
page execute and read and write
67E0000
trusted library allocation
page execute and read and write
33B1000
trusted library allocation
page read and write
13F0000
heap
page read and write
447F000
heap
page read and write
447B000
heap
page read and write
4E2E000
stack
page read and write
B04000
trusted library allocation
page read and write
4474000
heap
page read and write
D3E000
stack
page read and write
14E5000
heap
page read and write
45A5000
heap
page read and write
B10000
heap
page read and write
5BFE000
stack
page read and write
B50000
trusted library allocation
page read and write
493E000
stack
page read and write
313E000
stack
page read and write
26DE000
stack
page read and write
45A6000
heap
page read and write
4476000
heap
page read and write
45AD000
heap
page read and write
3F82000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
3F82000
heap
page read and write
451D000
heap
page read and write
3F82000
heap
page read and write
447B000
heap
page read and write
18DD000
trusted library allocation
page execute and read and write
4511000
heap
page read and write
E3F000
stack
page read and write
4000000
heap
page read and write
23A0000
heap
page execute and read and write
A85000
heap
page read and write
4474000
heap
page read and write
4970000
heap
page execute and read and write
4000000
heap
page read and write
1DE000
stack
page read and write
18C0000
trusted library allocation
page read and write
4519000
heap
page read and write
22CE000
stack
page read and write
57AB000
trusted library allocation
page read and write
451D000
heap
page read and write
447E000
heap
page read and write
44ED000
stack
page read and write
4000000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
6E00000
heap
page read and write
4516000
heap
page read and write
4000000
heap
page read and write
683E000
stack
page read and write
3F82000
heap
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
768000
heap
page read and write
5D3E000
stack
page read and write
4000000
heap
page read and write
545E000
stack
page read and write
6847000
trusted library allocation
page read and write
1950000
heap
page read and write
3F82000
heap
page read and write
4471000
heap
page read and write
2720000
trusted library allocation
page read and write
4000000
heap
page read and write
5ABC000
stack
page read and write
4000000
heap
page read and write
400000
unkown
page readonly
18D3000
trusted library allocation
page execute and read and write
646E000
stack
page read and write
3F82000
heap
page read and write
4512000
heap
page read and write
45AE000
heap
page read and write
451E000
heap
page read and write
4470000
heap
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
5CE000
stack
page read and write
A43000
trusted library allocation
page execute and read and write
3F82000
heap
page read and write
451F000
heap
page read and write
3F82000
heap
page read and write
4507000
heap
page read and write
4000000
heap
page read and write
4471000
heap
page read and write
4510000
heap
page read and write
447D000
heap
page read and write
4000000
heap
page read and write
12C000
stack
page read and write
45AF000
heap
page read and write
447B000
heap
page read and write
21C0000
heap
page read and write
4474000
heap
page read and write
4478000
heap
page read and write
2140000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
B5D000
trusted library allocation
page execute and read and write
4000000
heap
page read and write
4478000
heap
page read and write
43E000
system
page execute and read and write
3F82000
heap
page read and write
451D000
heap
page read and write
5D5000
heap
page read and write
9A000
unkown
page readonly
4507000
heap
page read and write
450E000
heap
page read and write
190000
heap
page read and write
B0D000
trusted library allocation
page execute and read and write
4000000
heap
page read and write
4503000
heap
page read and write
4508000
heap
page read and write
4514000
heap
page read and write
4E6E000
stack
page read and write
68DE000
stack
page read and write
3F82000
heap
page read and write
4475000
heap
page read and write
4ABE000
stack
page read and write
4001000
heap
page read and write
447D000
heap
page read and write
6ADE000
stack
page read and write
32B0000
heap
page execute and read and write
615000
heap
page read and write
4FEE000
stack
page read and write
146A000
heap
page read and write
4327000
trusted library allocation
page read and write
3F82000
heap
page read and write
4000000
heap
page read and write
5800000
heap
page read and write
3F82000
heap
page read and write
5D90000
trusted library allocation
page read and write
B54000
trusted library allocation
page read and write
4000000
heap
page read and write
57BA000
trusted library allocation
page read and write
13F8000
heap
page read and write
51C000
stack
page read and write
4000000
heap
page read and write
6576000
heap
page read and write
760000
heap
page read and write
4515000
heap
page read and write
4471000
heap
page read and write
There are 408 hidden memdumps, click here to show them.