IOC Report
SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_1b82bec763645d16ab9c0b439f8b0a42b432fae_974fe18f_a875a024-b057-4196-baf7-1056fcad35d7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81D3.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 01:24:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8232.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8262.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 272

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
studennotediw.stor
malicious
https://sergei-esenin.com/3f
unknown
malicious
https://sergei-esenin.com/
unknown
malicious
spirittunek.stor
malicious
bathdoomgaz.stor
malicious
trustterwowqm.shop
malicious
dissapoiznw.stor
malicious
eaglepawnoy.stor
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://sergei-esenin.com/apiSK
unknown
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/765611997243319006
unknown
malicious
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
http://upx.sf.net
unknown
https://community.akamai.steamstatic.com/public/shared/css/
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PA
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://studennotediw.store/
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=engli
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=qu55UpguGheU&l=e
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
trustterwowqm.shop
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
206.23.85.13.in-addr.arpa
unknown
malicious
dissapoiznw.store
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
ProgramId
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
FileId
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
LowerCaseLongPath
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
LongPathHash
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Name
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
OriginalFileName
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Publisher
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Version
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
BinFileVersion
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
BinaryType
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
ProductName
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
ProductVersion
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
LinkDate
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
BinProductVersion
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
AppxPackageFullName
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
AppxPackageRelativeId
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Size
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Language
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1376000
heap
page read and write
1359000
heap
page read and write
1361000
heap
page read and write
132C000
heap
page read and write
36CD000
stack
page read and write
DA0000
heap
page read and write
E30000
unkown
page readonly
144E000
stack
page read and write
168F000
stack
page read and write
357E000
stack
page read and write
30A0000
heap
page read and write
E30000
unkown
page readonly
E5D000
unkown
page read and write
EB5000
unkown
page execute and read and write
137E000
heap
page read and write
14B5000
heap
page read and write
133D000
heap
page read and write
382E000
stack
page read and write
E31000
unkown
page execute read
135F000
stack
page read and write
1300000
heap
page read and write
31EE000
stack
page read and write
2F8E000
stack
page read and write
30ED000
stack
page read and write
F30000
heap
page read and write
1388000
heap
page read and write
1374000
heap
page read and write
C5D000
stack
page read and write
148E000
stack
page read and write
308D000
stack
page read and write
E53000
unkown
page readonly
2F30000
heap
page read and write
178F000
stack
page read and write
F3A000
heap
page read and write
F8C000
stack
page read and write
EFE000
stack
page read and write
D5D000
stack
page read and write
EB8000
unkown
page readonly
DFE000
stack
page read and write
DB0000
heap
page read and write
125F000
stack
page read and write
367E000
stack
page read and write
14B0000
heap
page read and write
FF0000
heap
page read and write
13CD000
heap
page read and write
1080000
heap
page read and write
E31000
unkown
page execute read
1318000
heap
page read and write
37CD000
stack
page read and write
1310000
heap
page read and write
1339000
heap
page read and write
EB6000
unkown
page read and write
12FC000
stack
page read and write
134D000
heap
page read and write
E53000
unkown
page readonly
EB8000
unkown
page readonly
392F000
stack
page read and write
E5D000
unkown
page write copy
45F000
remote allocation
page execute and read and write
F3E000
heap
page read and write
There are 51 hidden memdumps, click here to show them.