IOC Report
SUNNY HONG VSL PARTICULARS.xlsx.exe

loading gif

Files

File Path
Type
Category
Malicious
SUNNY HONG VSL PARTICULARS.xlsx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Melber
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe
"C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://beirutrest.com
unknown

Domains

Name
IP
Malicious
beirutrest.com
50.87.144.157
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
50.87.144.157
beirutrest.com
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D0E000
heap
page read and write
malicious
5580000
trusted library section
page read and write
malicious
316F000
trusted library allocation
page read and write
malicious
40F1000
trusted library allocation
page read and write
malicious
55D0000
trusted library section
page read and write
malicious
3144000
trusted library allocation
page read and write
malicious
2CB2000
trusted library allocation
page read and write
2EBE000
stack
page read and write
40D3000
heap
page read and write
4860000
direct allocation
page read and write
A5E000
stack
page read and write
4860000
direct allocation
page read and write
5C3F000
stack
page read and write
5A42000
heap
page read and write
5536000
trusted library allocation
page read and write
3FA3000
heap
page read and write
6B14000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
2E73000
heap
page read and write
3175000
trusted library allocation
page read and write
444000
system
page execute and read and write
4860000
direct allocation
page read and write
6B08000
trusted library allocation
page read and write
490000
unkown
page read and write
960000
heap
page read and write
1120000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
70FE000
stack
page read and write
112D000
trusted library allocation
page execute and read and write
2E40000
heap
page read and write
56BE000
stack
page read and write
554A000
trusted library allocation
page read and write
401000
unkown
page execute read
136E000
stack
page read and write
47E3000
direct allocation
page read and write
553B000
trusted library allocation
page read and write
89F000
stack
page read and write
1110000
heap
page read and write
4989000
direct allocation
page read and write
554E000
trusted library allocation
page read and write
4060000
heap
page read and write
CBA000
stack
page read and write
40DA000
heap
page read and write
4989000
direct allocation
page read and write
11D0000
heap
page read and write
47E3000
direct allocation
page read and write
5D40000
heap
page read and write
6B7D000
stack
page read and write
49FE000
direct allocation
page read and write
47E3000
direct allocation
page read and write
3BC8000
heap
page read and write
6C0E000
stack
page read and write
BAF000
heap
page read and write
4061000
heap
page read and write
5B3E000
stack
page read and write
5A14000
heap
page read and write
1080000
heap
page read and write
3F45000
heap
page read and write
93E000
stack
page read and write
3074000
heap
page read and write
57BE000
stack
page read and write
6E4E000
stack
page read and write
5D50000
trusted library allocation
page execute and read and write
5542000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page execute and read and write
BA6000
heap
page read and write
1133000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
100000
heap
page read and write
117B000
heap
page read and write
57C0000
heap
page read and write
A10000
heap
page read and write
3F18000
heap
page read and write
2CB6000
trusted library allocation
page execute and read and write
498D000
direct allocation
page read and write
5556000
trusted library allocation
page read and write
402A000
heap
page read and write
47E3000
direct allocation
page read and write
316D000
trusted library allocation
page read and write
567D000
trusted library allocation
page read and write
401000
unkown
page execute read
106E000
stack
page read and write
7FDB0000
trusted library allocation
page execute and read and write
699E000
stack
page read and write
689E000
stack
page read and write
30EE000
stack
page read and write
2E70000
heap
page read and write
553E000
trusted library allocation
page read and write
4061000
heap
page read and write
49FE000
direct allocation
page read and write
2E30000
heap
page read and write
4AB000
unkown
page readonly
6C60000
trusted library allocation
page read and write
4028000
heap
page read and write
8AF000
stack
page read and write
37BE000
stack
page read and write
2CC0000
trusted library allocation
page read and write
71C0000
heap
page read and write
5551000
trusted library allocation
page read and write
2F1C000
heap
page read and write
4989000
direct allocation
page read and write
46C0000
direct allocation
page read and write
9DE000
stack
page read and write
41B2000
trusted library allocation
page read and write
5562000
trusted library allocation
page read and write
1070000
heap
page read and write
4148000
heap
page read and write
3F29000
heap
page read and write
2CC2000
trusted library allocation
page read and write
47E3000
direct allocation
page read and write
3020000
heap
page read and write
46C0000
direct allocation
page read and write
5570000
heap
page execute and read and write
3140000
trusted library allocation
page read and write
5ACC000
heap
page read and write
403D000
heap
page read and write
6B30000
trusted library allocation
page read and write
8FE000
stack
page read and write
2CCB000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
3F33000
heap
page read and write
1E0000
heap
page read and write
51EE000
stack
page read and write
498D000
direct allocation
page read and write
2FAC000
stack
page read and write
3BBF000
stack
page read and write
10DE000
stack
page read and write
400000
unkown
page readonly
1148000
heap
page read and write
47E3000
direct allocation
page read and write
940000
heap
page read and write
58FC000
stack
page read and write
4989000
direct allocation
page read and write
176F000
stack
page read and write
3F7F000
heap
page read and write
498D000
direct allocation
page read and write
4860000
direct allocation
page read and write
4A7000
unkown
page read and write
316B000
trusted library allocation
page read and write
B7A000
heap
page read and write
402A000
heap
page read and write
69DE000
stack
page read and write
10E0000
trusted library section
page read and write
980000
heap
page read and write
A00000
heap
page read and write
4461000
heap
page read and write
312A000
trusted library allocation
page read and write
A05000
heap
page read and write
1020000
heap
page read and write
2E00000
trusted library allocation
page execute and read and write
2CC5000
trusted library allocation
page execute and read and write
BAE000
heap
page read and write
2FE0000
heap
page read and write
49FE000
direct allocation
page read and write
5670000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
4061000
heap
page read and write
A60000
heap
page read and write
3C40000
direct allocation
page read and write
2F60000
heap
page execute and read and write
1085000
heap
page read and write
4860000
direct allocation
page read and write
8B4000
stack
page read and write
5530000
trusted library allocation
page read and write
DB8000
stack
page read and write
49FE000
direct allocation
page read and write
1130000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
6B10000
trusted library allocation
page read and write
4989000
direct allocation
page read and write
49FE000
direct allocation
page read and write
2E10000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page execute and read and write
4989000
direct allocation
page read and write
2E60000
trusted library allocation
page read and write
3E60000
heap
page read and write
117D000
heap
page read and write
2CE7000
heap
page read and write
1170000
heap
page read and write
46C0000
direct allocation
page read and write
B7E000
heap
page read and write
2DF0000
trusted library allocation
page read and write
3F22000
heap
page read and write
2CAF000
stack
page read and write
BAE000
heap
page read and write
3F3A000
heap
page read and write
9A000
stack
page read and write
11ED000
heap
page read and write
4039000
heap
page execute and read and write
1123000
trusted library allocation
page execute and read and write
3C45000
heap
page read and write
46C0000
direct allocation
page read and write
555D000
trusted library allocation
page read and write
1140000
heap
page read and write
6E0E000
stack
page read and write
6C57000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
498D000
direct allocation
page read and write
3D60000
heap
page read and write
6ED0000
heap
page read and write
113D000
trusted library allocation
page execute and read and write
59FC000
stack
page read and write
A15000
heap
page read and write
6E8F000
stack
page read and write
B70000
heap
page read and write
11A2000
heap
page read and write
6C4E000
stack
page read and write
4552000
heap
page read and write
46C0000
direct allocation
page read and write
72CE000
stack
page read and write
49FE000
direct allocation
page read and write
41F2000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
498D000
direct allocation
page read and write
3133000
trusted library allocation
page read and write
482000
unkown
page readonly
490000
unkown
page write copy
482000
unkown
page readonly
3228000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
2CBA000
trusted library allocation
page execute and read and write
140F000
stack
page read and write
5A00000
heap
page read and write
1124000
trusted library allocation
page read and write
400000
unkown
page readonly
3070000
heap
page read and write
4AB000
unkown
page readonly
400000
system
page execute and read and write
6ADE000
stack
page read and write
2CE0000
heap
page read and write
498D000
direct allocation
page read and write
10F0000
trusted library section
page read and write
3183000
trusted library allocation
page read and write
There are 227 hidden memdumps, click here to show them.