IOC Report
PURCHASE ORDER-6350-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
PURCHASE ORDER-6350-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASE ORDER-6350-2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aa3ncavf.zhi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqvapdi5.4ez.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3phy5qo.2xj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjxw10nb.fvq.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe
"C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe"
malicious
C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe
"C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe"
malicious
C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe
"C:\Users\user\Desktop\PURCHASE ORDER-6350-2024.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.mbarieservicesltd.com
unknown

Domains

Name
IP
Malicious
mail.mbarieservicesltd.com
199.79.62.115
malicious

IPs

IP
Domain
Country
Malicious
199.79.62.115
mail.mbarieservicesltd.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3A29000
trusted library allocation
page read and write
malicious
2D11000
trusted library allocation
page read and write
malicious
2D6A000
trusted library allocation
page read and write
malicious
4FB0000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
548E000
stack
page read and write
654C000
trusted library allocation
page read and write
5EAF000
stack
page read and write
BC0000
heap
page read and write
109E000
stack
page read and write
66F4000
trusted library allocation
page read and write
682000
unkown
page readonly
FAC000
heap
page read and write
29E0000
trusted library allocation
page read and write
63D4000
heap
page read and write
2A10000
heap
page read and write
5093000
heap
page read and write
100E000
heap
page read and write
526A000
trusted library allocation
page read and write
570E000
stack
page read and write
D1A000
heap
page read and write
B6CE000
stack
page read and write
F03000
trusted library allocation
page execute and read and write
1245000
trusted library allocation
page execute and read and write
1003000
trusted library allocation
page execute and read and write
D7F000
heap
page read and write
1030000
trusted library allocation
page read and write
4F1E000
trusted library allocation
page read and write
29F0000
heap
page execute and read and write
4F80000
heap
page read and write
F98000
heap
page read and write
1100000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
D08000
heap
page read and write
102A000
trusted library allocation
page execute and read and write
8840000
heap
page read and write
8AAE000
stack
page read and write
544C000
stack
page read and write
6710000
trusted library allocation
page read and write
C4E000
stack
page read and write
F10000
heap
page read and write
3A21000
trusted library allocation
page read and write
510B000
stack
page read and write
4F21000
trusted library allocation
page read and write
F18000
heap
page read and write
5520000
heap
page read and write
6540000
trusted library allocation
page read and write
B58E000
stack
page read and write
2C5C000
stack
page read and write
4F90000
trusted library allocation
page execute and read and write
42C000
remote allocation
page execute and read and write
6E00000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
2CC0000
heap
page read and write
1240000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
103B000
trusted library allocation
page execute and read and write
4BBC000
stack
page read and write
6E25000
trusted library allocation
page read and write
5120000
heap
page read and write
5641000
trusted library allocation
page read and write
888C000
heap
page read and write
64B0000
trusted library allocation
page read and write
53B0000
heap
page read and write
1117000
heap
page read and write
D15000
heap
page read and write
526E000
trusted library allocation
page read and write
6720000
trusted library allocation
page execute and read and write
121F000
stack
page read and write
6DB0000
trusted library allocation
page read and write
5110000
trusted library section
page readonly
1026000
trusted library allocation
page execute and read and write
683F000
stack
page read and write
F04000
trusted library allocation
page read and write
687E000
stack
page read and write
6DF0000
trusted library allocation
page read and write
679D000
stack
page read and write
12C8000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
52FC000
stack
page read and write
4F2D000
trusted library allocation
page read and write
64F0000
trusted library allocation
page execute and read and write
88B6000
heap
page read and write
FE1000
heap
page read and write
2CD0000
trusted library allocation
page read and write
680000
unkown
page readonly
B29000
stack
page read and write
6714000
trusted library allocation
page read and write
FEE000
stack
page read and write
1260000
heap
page read and write
4F26000
trusted library allocation
page read and write
3D19000
trusted library allocation
page read and write
D8F000
heap
page read and write
B7CF000
stack
page read and write
1110000
heap
page read and write
6E20000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
539E000
stack
page read and write
63E8000
heap
page read and write
53A0000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
F3B000
heap
page read and write
B44F000
stack
page read and write
71C000
unkown
page readonly
4FA0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6E9D000
stack
page read and write
B450000
heap
page read and write
10F0000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
50B0000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
7E5000
heap
page read and write
1022000
trusted library allocation
page read and write
C8E000
stack
page read and write
D40000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
B1AF000
stack
page read and write
57F0000
trusted library allocation
page read and write
5620000
trusted library section
page read and write
10E0000
trusted library allocation
page execute and read and write
5262000
trusted library allocation
page read and write
6750000
heap
page read and write
F0D000
trusted library allocation
page execute and read and write
4A28000
trusted library allocation
page read and write
CD0000
heap
page read and write
2D00000
heap
page read and write
53D0000
heap
page read and write
5294000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
707E000
stack
page read and write
CDE000
heap
page read and write
1232000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
5090000
heap
page read and write
7E0000
heap
page read and write
7F700000
trusted library allocation
page execute and read and write
64C0000
trusted library allocation
page read and write
5230000
heap
page read and write
1004000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
F00000
trusted library allocation
page read and write
EF8000
stack
page read and write
8844000
heap
page read and write
ECE000
stack
page read and write
B2AE000
stack
page read and write
1242000
trusted library allocation
page read and write
6F9E000
stack
page read and write
5282000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page execute and read and write
56CF000
stack
page read and write
6DD0000
trusted library allocation
page execute and read and write
1020000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
7AA000
stack
page read and write
55CE000
stack
page read and write
88B1000
heap
page read and write
57F7000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
F9A000
heap
page read and write
F9D000
heap
page read and write
EE0000
heap
page read and write
4FA2000
trusted library allocation
page read and write
FE3000
heap
page read and write
70EE000
stack
page read and write
2CF0000
heap
page execute and read and write
50A0000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
670D000
trusted library allocation
page read and write
CA0000
heap
page read and write
88CA000
heap
page read and write
CFA000
heap
page read and write
B80E000
stack
page read and write
123A000
trusted library allocation
page execute and read and write
5295000
heap
page read and write
122D000
trusted library allocation
page execute and read and write
5240000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
2A21000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
6C9E000
stack
page read and write
6520000
heap
page read and write
5250000
trusted library allocation
page read and write
D60000
heap
page read and write
B90000
heap
page read and write
6530000
trusted library allocation
page execute and read and write
29D5000
trusted library allocation
page read and write
2CC3000
heap
page read and write
2C1E000
stack
page read and write
12BE000
stack
page read and write
5256000
trusted library allocation
page read and write
B94B000
stack
page read and write
8940000
trusted library section
page read and write
10DC000
stack
page read and write
2CA0000
heap
page read and write
7202000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1360000
trusted library allocation
page execute and read and write
1247000
trusted library allocation
page execute and read and write
5340000
heap
page execute and read and write
6DE0000
trusted library allocation
page read and write
889B000
heap
page read and write
7F980000
trusted library allocation
page execute and read and write
2D51000
trusted library allocation
page read and write
C00000
heap
page read and write
F47000
heap
page read and write
6E30000
trusted library allocation
page read and write
2A34000
trusted library allocation
page read and write
B68F000
stack
page read and write
2D78000
trusted library allocation
page read and write
111E000
stack
page read and write
BA4C000
stack
page read and write
6547000
trusted library allocation
page read and write
1236000
trusted library allocation
page execute and read and write
2CE0000
trusted library allocation
page read and write
6DAE000
stack
page read and write
57E0000
trusted library allocation
page read and write
CD8000
heap
page read and write
4E0D000
stack
page read and write
F45000
heap
page read and write
1013000
trusted library allocation
page read and write
3D11000
trusted library allocation
page read and write
BC5000
heap
page read and write
1370000
heap
page read and write
4FC0000
heap
page execute and read and write
8850000
heap
page read and write
63C8000
heap
page read and write
D48000
heap
page read and write
5220000
heap
page read and write
AF7000
stack
page read and write
D7B000
heap
page read and write
124B000
trusted library allocation
page execute and read and write
5271000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
558E000
stack
page read and write
1010000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
DB5000
heap
page read and write
1050000
trusted library allocation
page read and write
B20000
heap
page read and write
B90E000
stack
page read and write
29BE000
stack
page read and write
5250000
trusted library allocation
page read and write
6549000
trusted library allocation
page read and write
6E50000
trusted library allocation
page execute and read and write
6CAE000
stack
page read and write
63B0000
heap
page read and write
There are 246 hidden memdumps, click here to show them.