IOC Report
https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\513954456.dps_tax_gov_ua_176226535.rar (copy)
RAR archive data, v5
dropped
malicious
C:\Users\user\AppData\Local\Temp\qesg00jw.bsa\dps_tax_gov_ua_0739220983\??????????? ????? ?????????? ?????????? ??????.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:24:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:24:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:24:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:24:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 13:24:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\513954456.dps_tax_gov_ua_176226535.rar.crdownload
RAR archive data, v5
dropped
C:\Users\user\Downloads\6e90ac44-d9c0-4cda-8141-962b8854ae7c.tmp
RAR archive data, v5
dropped
Chrome Cache Entry: 64
RAR archive data, v5
downloaded
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1928,i,16173882429876364777,7260947151097184909,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\513954456.dps_tax_gov_ua_176226535.rar"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\qesg00jw.bsa" "C:\Users\user\Downloads\513954456.dps_tax_gov_ua_176226535.rar"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2
https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2
80.87.203.251

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.186.132
qaz.is
80.87.203.251
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
80.87.203.251
qaz.is
Russian Federation
239.255.255.250
unknown
Reserved
142.250.186.132
www.google.com
United States
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
A40000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
58C000
heap
page read and write
650000
heap
page read and write
85C000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page execute and read and write
2742000
trusted library allocation
page read and write
2747000
trusted library allocation
page read and write
12F0000
heap
page read and write
271A000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
55E000
heap
page read and write
4F6000
stack
page read and write
2750000
trusted library allocation
page read and write
82F000
stack
page read and write
15F0000
heap
page read and write
550000
heap
page read and write
1180000
heap
page read and write
14C000
stack
page read and write
2DF0000
heap
page read and write
2730000
trusted library allocation
page read and write
113D000
stack
page read and write
273B000
trusted library allocation
page read and write
15EF000
stack
page read and write
8DE000
stack
page read and write
14EF000
stack
page read and write
2754000
trusted library allocation
page read and write
55B000
heap
page read and write
2700000
trusted library allocation
page read and write
2DB0000
heap
page read and write
84A000
trusted library allocation
page execute and read and write
A60000
heap
page read and write
4BAE000
stack
page read and write
1190000
heap
page read and write
492E000
stack
page read and write
47CF000
stack
page read and write
4A2D000
stack
page read and write
4FB000
stack
page read and write
4B6E000
stack
page read and write
B6E000
stack
page read and write
1C0000
heap
page read and write
274A000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
87A000
trusted library allocation
page execute and read and write
4DEF000
stack
page read and write
273F000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
12AE000
stack
page read and write
85A000
trusted library allocation
page execute and read and write
4A6E000
stack
page read and write
576000
heap
page read and write
2725000
trusted library allocation
page read and write
872000
trusted library allocation
page execute and read and write
270A000
trusted library allocation
page read and write
1B0000
heap
page read and write
897000
trusted library allocation
page execute and read and write
4CEE000
stack
page read and write
852000
trusted library allocation
page execute and read and write
980000
heap
page execute and read and write
842000
trusted library allocation
page execute and read and write
12F7000
heap
page read and write
4CAE000
stack
page read and write
48CF000
stack
page read and write
26D1000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
103C000
stack
page read and write
2DE0000
heap
page read and write
4F9000
stack
page read and write
96E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
12EE000
stack
page read and write
89B000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
2DE5000
heap
page read and write
7EFD0000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
53E000
stack
page read and write
2733000
trusted library allocation
page read and write
2736000
trusted library allocation
page read and write
880000
heap
page read and write
There are 70 hidden memdumps, click here to show them.