IOC Report
SecuriteInfo.com.Trojan.DownLoader47.43340.12576.1316.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.DownLoader47.43340.12576.1316.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_faac6578d9eb4145cf24c623c8a7076a595e99_473dd2bc_52b31ccd-8eba-4a37-807f-7573b8398155\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_ae274dd2d8e175c4221032451d263566c21c18b0_6b0bd2f1_d1b59c26-6c33-478e-ad15-96ff249114f2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B74.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 22:42:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E54.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E74.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAED9.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 22:41:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAFC4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAFF4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.12576.1316.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.12576.1316.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7452 -s 280
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 1260

URLs

Name
IP
Malicious
http://46.8.231.109/j
unknown
malicious
http://46.8.231.109/RPC
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.php
malicious
http://46.8.231.109(x
unknown
malicious
http://46.8.231.109/o
unknown
malicious
http://46.8.231.109/1
unknown
malicious
http://46.8.231.109
unknown
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
ProgramId
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
FileId
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
LowerCaseLongPath
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
LongPathHash
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Name
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
OriginalFileName
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Publisher
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Version
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
BinFileVersion
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
BinaryType
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
ProductName
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
ProductVersion
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
LinkDate
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
BinProductVersion
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
AppxPackageFullName
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
AppxPackageRelativeId
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Size
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Language
\REGISTRY\A\{b834550b-35f3-4e87-0d29-25244aea4ab5}\Root\InventoryApplicationFile\securiteinfo.com|30053a0b6d294726
Usn
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{16cf4a8c-6117-fc7f-a31f-16dfd75927c4}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011E081EC87
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12E7000
heap
page read and write
malicious
EED000
unkown
page read and write
malicious
49A000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
14DF000
stack
page read and write
65C000
remote allocation
page execute and read and write
92E000
stack
page read and write
12BE000
stack
page read and write
BFF000
stack
page read and write
462000
remote allocation
page execute and read and write
F3C000
unkown
page readonly
7C0000
heap
page read and write
EE3000
unkown
page readonly
EC1000
unkown
page execute read
45A000
remote allocation
page execute and read and write
F3B000
unkown
page read and write
1580000
heap
page read and write
EC1000
unkown
page execute read
2E2E000
stack
page read and write
CFF000
stack
page read and write
A0E000
heap
page read and write
F3C000
unkown
page readonly
A00000
heap
page read and write
EC0000
unkown
page readonly
10FE000
stack
page read and write
1B1BE000
stack
page read and write
1326000
heap
page read and write
1AEFF000
stack
page read and write
1B03C000
stack
page read and write
1342000
heap
page read and write
1B17F000
stack
page read and write
1B2BF000
stack
page read and write
11A0000
heap
page read and write
1AF3D000
stack
page read and write
EC0000
unkown
page readonly
66C000
stack
page read and write
64A000
remote allocation
page execute and read and write
1583000
heap
page read and write
1B40E000
stack
page read and write
1B07E000
stack
page read and write
EE3000
unkown
page readonly
810000
heap
page read and write
14F0000
heap
page read and write
1B30E000
stack
page read and write
48F000
remote allocation
page execute and read and write
A0A000
heap
page read and write
132E000
heap
page read and write
488000
remote allocation
page execute and read and write
1160000
heap
page read and write
485000
remote allocation
page execute and read and write
F3A000
unkown
page execute and read and write
10F5000
stack
page read and write
115E000
stack
page read and write
1110000
heap
page read and write
11A5000
heap
page read and write
12E0000
heap
page read and write
1B490000
heap
page read and write
96E000
stack
page read and write
7D0000
heap
page read and write
DAC000
stack
page read and write
EED000
unkown
page write copy
76D000
stack
page read and write
154E000
stack
page read and write
There are 53 hidden memdumps, click here to show them.