IOC Report
ASL OTSL 2 ship's Particulars.xlsx.exe

loading gif

Files

File Path
Type
Category
Malicious
ASL OTSL 2 ship's Particulars.xlsx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\antiprimer
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ASL OTSL 2 ship's Particulars.xlsx.exe
"C:\Users\user\Desktop\ASL OTSL 2 ship's Particulars.xlsx.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\ASL OTSL 2 ship's Particulars.xlsx.exe"
malicious

URLs

Name
IP
Malicious
http://beirutrest.com
unknown
malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
beirutrest.com
50.87.144.157
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
50.87.144.157
beirutrest.com
United States
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
265E000
heap
page read and write
malicious
3901000
trusted library allocation
page read and write
malicious
4FE0000
trusted library section
page read and write
malicious
4F20000
trusted library section
page read and write
malicious
2954000
trusted library allocation
page read and write
malicious
297F000
trusted library allocation
page read and write
malicious
9A0000
heap
page read and write
401000
unkown
page execute read
3EE1000
heap
page read and write
3EE1000
heap
page read and write
3EE1000
heap
page read and write
9A000
stack
page read and write
4710000
direct allocation
page read and write
3F26000
heap
page read and write
63AE000
stack
page read and write
4710000
direct allocation
page read and write
3BE0000
heap
page read and write
3EE1000
heap
page read and write
8CE000
heap
page read and write
444000
system
page execute and read and write
4693000
direct allocation
page read and write
4F80000
trusted library allocation
page read and write
3EB1000
heap
page read and write
3CE0000
heap
page read and write
4FC0000
trusted library allocation
page read and write
94D000
stack
page read and write
4693000
direct allocation
page read and write
4570000
direct allocation
page read and write
3EE1000
heap
page read and write
3E77000
heap
page read and write
3E77000
heap
page read and write
2A38000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
8F3000
heap
page read and write
3EE0000
heap
page read and write
3E77000
heap
page read and write
426000
system
page execute and read and write
4570000
direct allocation
page read and write
3EE1000
heap
page read and write
950000
heap
page read and write
4693000
direct allocation
page read and write
B27000
heap
page read and write
3EE1000
heap
page read and write
626E000
stack
page read and write
59A000
stack
page read and write
2985000
trusted library allocation
page read and write
490000
unkown
page write copy
48AE000
direct allocation
page read and write
6B1E000
stack
page read and write
100000
heap
page read and write
4E1E000
stack
page read and write
6A10000
heap
page read and write
3E77000
heap
page read and write
3E77000
heap
page read and write
B10000
trusted library allocation
page read and write
980000
heap
page read and write
27E0000
trusted library allocation
page read and write
6C5E000
stack
page read and write
1740000
heap
page read and write
5FE0000
trusted library allocation
page execute and read and write
B35000
trusted library allocation
page execute and read and write
1BE000
stack
page read and write
970000
heap
page read and write
652E000
stack
page read and write
3D2B000
heap
page read and write
4F8B000
trusted library allocation
page read and write
66EE000
stack
page read and write
53BF000
heap
page read and write
110000
heap
page read and write
118E000
stack
page read and write
AF3000
trusted library allocation
page execute and read and write
2F20000
heap
page read and write
3E77000
heap
page read and write
4FA6000
trusted library allocation
page read and write
490000
unkown
page read and write
15E000
stack
page read and write
63F4000
trusted library allocation
page read and write
9A5000
heap
page read and write
4F8E000
trusted library allocation
page read and write
3EE1000
heap
page read and write
D5E000
stack
page read and write
3E77000
heap
page read and write
3E77000
heap
page read and write
4839000
direct allocation
page read and write
1770000
heap
page read and write
973000
heap
page read and write
48AE000
direct allocation
page read and write
8CA000
heap
page read and write
3EE1000
heap
page read and write
52AC000
stack
page read and write
BDE000
heap
page read and write
8AF000
stack
page read and write
3E77000
heap
page read and write
672E000
stack
page read and write
3EE1000
heap
page read and write
8B4000
stack
page read and write
BD4000
heap
page read and write
C0C000
heap
page read and write
551D000
trusted library allocation
page read and write
BF4000
heap
page read and write
3EE1000
heap
page read and write
6770000
trusted library allocation
page read and write
48AE000
direct allocation
page read and write
B9D000
heap
page read and write
483D000
direct allocation
page read and write
3E77000
heap
page read and write
3D8A000
heap
page read and write
53CE000
heap
page read and write
5050000
trusted library allocation
page read and write
400000
system
page execute and read and write
158F000
stack
page read and write
4908000
trusted library allocation
page read and write
3EE1000
heap
page read and write
62AE000
stack
page read and write
2991000
trusted library allocation
page read and write
5520000
heap
page read and write
3EE1000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
43F3000
heap
page read and write
6B5E000
stack
page read and write
51AC000
stack
page read and write
3EE1000
heap
page read and write
3E77000
heap
page read and write
3B02000
heap
page read and write
4710000
direct allocation
page read and write
B16000
trusted library allocation
page execute and read and write
48AE000
direct allocation
page read and write
3EE1000
heap
page read and write
BC0000
heap
page read and write
3E77000
heap
page read and write
B3B000
trusted library allocation
page execute and read and write
6400000
trusted library allocation
page execute and read and write
2600000
trusted library allocation
page execute and read and write
2630000
heap
page read and write
6540000
trusted library allocation
page read and write
3E77000
heap
page read and write
3E77000
heap
page read and write
483D000
direct allocation
page read and write
27F0000
heap
page read and write
3DB6000
heap
page read and write
B20000
heap
page read and write
3D88000
heap
page read and write
6537000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
7EE20000
trusted library allocation
page execute and read and write
B68000
heap
page read and write
8FB000
heap
page read and write
52D0000
heap
page read and write
3E77000
heap
page read and write
B37000
trusted library allocation
page execute and read and write
534B000
heap
page read and write
4710000
direct allocation
page read and write
4570000
direct allocation
page read and write
AFD000
trusted library allocation
page execute and read and write
297B000
trusted library allocation
page read and write
293A000
trusted library allocation
page read and write
64EE000
stack
page read and write
3AF0000
heap
page read and write
4839000
direct allocation
page read and write
53AB000
heap
page read and write
B60000
heap
page read and write
3DA3000
heap
page read and write
89F000
stack
page read and write
8C0000
heap
page read and write
42EC000
heap
page read and write
4F9A000
trusted library allocation
page read and write
1720000
heap
page read and write
52D4000
heap
page read and write
676E000
stack
page read and write
B0D000
trusted library allocation
page execute and read and write
4F70000
heap
page execute and read and write
B32000
trusted library allocation
page read and write
AF4000
trusted library allocation
page read and write
4693000
direct allocation
page read and write
3E77000
heap
page read and write
2DCE000
stack
page read and write
3DB1000
heap
page read and write
4710000
direct allocation
page read and write
2E0E000
stack
page read and write
400000
unkown
page readonly
48AE000
direct allocation
page read and write
482000
unkown
page readonly
1744000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4AB000
unkown
page readonly
39C2000
trusted library allocation
page read and write
175000
heap
page read and write
C51000
heap
page read and write
2620000
trusted library allocation
page read and write
4839000
direct allocation
page read and write
AF0000
trusted library allocation
page read and write
3E77000
heap
page read and write
3EE1000
heap
page read and write
3EAC000
heap
page execute and read and write
63F0000
trusted library allocation
page read and write
3B00000
direct allocation
page read and write
2E13000
heap
page read and write
3E94000
heap
page read and write
297D000
trusted library allocation
page read and write
3E5E000
heap
page read and write
3E77000
heap
page read and write
483D000
direct allocation
page read and write
277E000
stack
page read and write
AD0000
trusted library section
page read and write
3E77000
heap
page read and write
4F92000
trusted library allocation
page read and write
2610000
heap
page execute and read and write
616D000
stack
page read and write
3EE1000
heap
page read and write
4FA1000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
3E77000
heap
page read and write
B12000
trusted library allocation
page read and write
3EE1000
heap
page read and write
4F1F000
stack
page read and write
4710000
direct allocation
page read and write
3EE1000
heap
page read and write
3E2E000
heap
page read and write
28FF000
stack
page read and write
483D000
direct allocation
page read and write
63E8000
trusted library allocation
page read and write
3EE1000
heap
page read and write
B03000
trusted library allocation
page read and write
48AE000
direct allocation
page read and write
400000
unkown
page readonly
483D000
direct allocation
page read and write
645D000
stack
page read and write
5510000
trusted library allocation
page read and write
4839000
direct allocation
page read and write
482000
unkown
page readonly
4F86000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
366E000
stack
page read and write
2901000
trusted library allocation
page read and write
5312000
heap
page read and write
3E77000
heap
page read and write
3EE1000
heap
page read and write
3A6F000
stack
page read and write
3A05000
trusted library allocation
page read and write
4693000
direct allocation
page read and write
B1A000
trusted library allocation
page execute and read and write
2950000
trusted library allocation
page read and write
BC6000
heap
page read and write
900000
heap
page read and write
4FD0000
trusted library allocation
page read and write
8F8000
stack
page read and write
4839000
direct allocation
page read and write
3DCF000
heap
page read and write
4570000
direct allocation
page read and write
2F25000
heap
page read and write
532F000
heap
page read and write
B9A000
heap
page read and write
4570000
direct allocation
page read and write
4839000
direct allocation
page read and write
3EE1000
heap
page read and write
4A7000
unkown
page read and write
3EE1000
heap
page read and write
BE6000
heap
page read and write
483D000
direct allocation
page read and write
27BC000
stack
page read and write
67B0000
heap
page read and write
3EE1000
heap
page read and write
401000
unkown
page execute read
A80000
heap
page read and write
170000
heap
page read and write
3E77000
heap
page read and write
3E77000
heap
page read and write
3EBE000
heap
page read and write
AC0000
trusted library section
page read and write
4570000
direct allocation
page read and write
3A72000
heap
page read and write
4F9E000
trusted library allocation
page read and write
3E77000
heap
page read and write
6410000
trusted library allocation
page read and write
5070000
heap
page read and write
B50000
trusted library allocation
page read and write
3EE1000
heap
page read and write
3E77000
heap
page read and write
1C0000
heap
page read and write
27C0000
heap
page read and write
4AB000
unkown
page readonly
B90000
heap
page read and write
3EE1000
heap
page read and write
4A9E000
stack
page read and write
69DE000
stack
page read and write
3D92000
heap
page read and write
3F4F000
heap
page read and write
4693000
direct allocation
page read and write
3EE1000
heap
page read and write
There are 281 hidden memdumps, click here to show them.