IOC Report
new shipment.exe

loading gif

Files

File Path
Type
Category
Malicious
new shipment.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_new shipment.exe_cf9e7cdece334ae16e292f86892c8231666c6d1_259f3213_27c3b52c-8e6f-4e02-87e9-458d211d40c1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER92DB.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Sep 27 14:01:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9434.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9464.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\new shipment.exe
"C:\Users\user\Desktop\new shipment.exe"
malicious
C:\Users\user\Desktop\new shipment.exe
"C:\Users\user\Desktop\new shipment.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 1528

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
132.226.8.169
http://checkip.dyndns.com
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://varders.kozow.com:8081
unknown
http://checkip.dyndns.org/q
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
ProgramId
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
FileId
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
LowerCaseLongPath
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
LongPathHash
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Name
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
OriginalFileName
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Publisher
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Version
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
BinFileVersion
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
BinaryType
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
ProductName
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
ProductVersion
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
LinkDate
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
BinProductVersion
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
AppxPackageFullName
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
AppxPackageRelativeId
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Size
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Language
malicious
\REGISTRY\A\{8298f890-4915-f8cf-9eff-120a5d6ff356}\Root\InventoryApplicationFile\new shipment.exe|76eaaa942b7254bd
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new shipment_RASMANCS
FileDirectory
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3611000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
40A1000
trusted library allocation
page read and write
malicious
15C3000
trusted library allocation
page execute and read and write
597E000
stack
page read and write
5830000
trusted library allocation
page read and write
2000000
trusted library allocation
page read and write
15C3000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
1C9E000
stack
page read and write
5E1F000
stack
page read and write
309E000
stack
page read and write
6505000
heap
page read and write
15E7000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
784E000
stack
page read and write
59E0000
heap
page read and write
2F3E000
stack
page read and write
200B000
trusted library allocation
page read and write
15D0000
heap
page read and write
55D2000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1FA0000
heap
page read and write
64A0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
12BE000
heap
page read and write
1610000
heap
page read and write
1860000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
7610000
heap
page read and write
209E000
stack
page read and write
5740000
trusted library allocation
page read and write
4639000
trusted library allocation
page read and write
5750000
heap
page read and write
15B0000
trusted library allocation
page read and write
1C40000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
59A0000
heap
page read and write
59C0000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
15CD000
trusted library allocation
page execute and read and write
1840000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
15B4000
trusted library allocation
page read and write
15D5000
heap
page read and write
12B0000
heap
page read and write
5BE0000
trusted library section
page read and write
794E000
stack
page read and write
18A0000
heap
page read and write
5753000
heap
page read and write
1850000
heap
page read and write
20DD000
stack
page read and write
1FF5000
trusted library allocation
page read and write
5B56000
heap
page read and write
156B000
heap
page read and write
55C1000
trusted library allocation
page read and write
1187000
stack
page read and write
6510000
heap
page read and write
5860000
trusted library allocation
page read and write
5AE0000
heap
page read and write
1470000
heap
page read and write
2F90000
heap
page execute and read and write
59C9000
trusted library allocation
page read and write
5E5E000
stack
page read and write
579E000
stack
page read and write
1320000
heap
page read and write
1205000
heap
page read and write
36D2000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
1385000
heap
page read and write
13AB000
heap
page read and write
68AF000
stack
page read and write
5BF0000
trusted library allocation
page execute and read and write
5B08000
heap
page read and write
1867000
trusted library allocation
page execute and read and write
1460000
heap
page read and write
6490000
trusted library allocation
page execute and read and write
4615000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
59C6000
trusted library allocation
page read and write
67AF000
stack
page read and write
7D12000
trusted library allocation
page read and write
59F0000
heap
page read and write
1846000
trusted library allocation
page execute and read and write
761E000
heap
page read and write
35A7000
trusted library allocation
page read and write
6AAE000
stack
page read and write
66AE000
stack
page read and write
5D00000
heap
page read and write
6544000
heap
page read and write
523E000
stack
page read and write
55F0000
trusted library allocation
page read and write
1C50000
heap
page execute and read and write
5C70000
trusted library section
page readonly
6500000
heap
page read and write
55FF000
trusted library allocation
page read and write
15C4000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
1088000
stack
page read and write
59B0000
trusted library allocation
page execute and read and write
55E0000
trusted library allocation
page read and write
1210000
heap
page read and write
5B29000
heap
page read and write
36BD000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
15B3000
trusted library allocation
page execute and read and write
2F7E000
stack
page read and write
645E000
stack
page read and write
10FB000
stack
page read and write
1F9E000
stack
page read and write
17EE000
stack
page read and write
6460000
heap
page read and write
1D7D000
stack
page read and write
2050000
heap
page read and write
15DA000
trusted library allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
5BD0000
heap
page execute and read and write
1890000
trusted library allocation
page execute and read and write
5B2D000
stack
page read and write
D10000
unkown
page readonly
12BA000
heap
page read and write
184A000
trusted library allocation
page execute and read and write
6528000
heap
page read and write
1830000
trusted library allocation
page read and write
1D80000
trusted library allocation
page read and write
1395000
heap
page read and write
5C6C000
stack
page read and write
D12000
unkown
page readonly
5605000
trusted library allocation
page read and write
36B5000
trusted library allocation
page read and write
65AE000
stack
page read and write
57A0000
trusted library section
page read and write
1D86000
trusted library allocation
page read and write
4611000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
5E9E000
stack
page read and write
15EB000
trusted library allocation
page execute and read and write
5BAE000
stack
page read and write
9560000
trusted library allocation
page read and write
14D7000
heap
page read and write
36B8000
trusted library allocation
page read and write
5842000
trusted library allocation
page read and write
5749000
trusted library allocation
page read and write
14A0000
heap
page read and write
36C6000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
2010000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
12F3000
heap
page read and write
5B1D000
heap
page read and write
5610000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
5B19000
heap
page read and write
15BD000
trusted library allocation
page execute and read and write
55C6000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
12E5000
heap
page read and write
11F7000
stack
page read and write
15E2000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3236000
trusted library allocation
page read and write
1591000
heap
page read and write
1E9E000
stack
page read and write
36C9000
trusted library allocation
page read and write
15D6000
trusted library allocation
page execute and read and write
5B21000
heap
page read and write
5C00000
trusted library allocation
page read and write
1862000
trusted library allocation
page read and write
1650000
heap
page read and write
5844000
trusted library allocation
page read and write
1D90000
heap
page read and write
5B6E000
stack
page read and write
5820000
trusted library allocation
page read and write
69AF000
stack
page read and write
12DB000
heap
page read and write
780F000
stack
page read and write
1200000
heap
page read and write
182D000
stack
page read and write
64EE000
stack
page read and write
16EE000
stack
page read and write
1620000
heap
page read and write
5870000
heap
page execute and read and write
21FF000
stack
page read and write
1627000
heap
page read and write
186B000
trusted library allocation
page execute and read and write
55BE000
trusted library allocation
page read and write
2F80000
trusted library allocation
page execute and read and write
14A8000
heap
page read and write
5743000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
6520000
heap
page read and write
1630000
heap
page read and write
15CD000
trusted library allocation
page execute and read and write
There are 189 hidden memdumps, click here to show them.