IOC Report
SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\Public\Documents\CalibreLauncher.js
ASCII text
dropped
malicious
C:\Users\Public\Documents\calibre-launcher.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Documents\calibre.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Calibre.url
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\Public\Documents\CalibreLauncher.js>), ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\WikG.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.4266.14577.exe"
malicious
C:\Users\Public\Documents\calibre.exe
C:\Users\Public\Documents\calibre.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\CalibreLauncher.js"
malicious
C:\Users\Public\Documents\calibre.exe
"C:\Users\Public\Documents\calibre.exe"
malicious

URLs

Name
IP
Malicious
https://calibre-ebook.com
unknown

IPs

IP
Domain
Country
Malicious
45.202.35.101
unknown
Seychelles

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
3B40000
heap
page read and write
BAA000
heap
page read and write
41B2000
heap
page read and write
1DDF2528000
heap
page read and write
28888EE7000
heap
page read and write
28888E40000
heap
page read and write
4113000
heap
page read and write
25F4000
heap
page read and write
1DDF24E0000
heap
page read and write
46E7000
heap
page read and write
37D1000
heap
page read and write
37D1000
heap
page read and write
2A20000
heap
page read and write
37D1000
heap
page read and write
1DDF2591000
heap
page read and write
3B70000
heap
page read and write
3CB0000
heap
page read and write
438C000
heap
page read and write
CC6000
heap
page read and write
25F7000
heap
page read and write
7E175FF000
stack
page read and write
3B8A000
heap
page read and write
B1000
unkown
page execute read
37D1000
heap
page read and write
28888D20000
heap
page read and write
28888EE0000
heap
page read and write
B4000
unkown
page readonly
B30000
heap
page read and write
4184000
heap
page read and write
3C0A000
heap
page read and write
3B8A000
heap
page read and write
3CC0000
heap
page read and write
7FF63BB01000
unkown
page read and write
3BFA000
heap
page read and write
95F17F9000
stack
page read and write
28BB000
heap
page read and write
37D1000
heap
page read and write
3C0A000
heap
page read and write
1DDF2572000
heap
page read and write
1DDF3ED0000
heap
page read and write
2A2A000
heap
page read and write
7FF63B850000
unkown
page readonly
1DDF24ED000
heap
page read and write
BA0000
heap
page read and write
37D1000
heap
page read and write
B7A000
heap
page read and write
37D1000
heap
page read and write
3C4A000
heap
page read and write
1DDF24A0000
heap
page read and write
37D1000
heap
page read and write
D80000
heap
page read and write
3B7A000
heap
page read and write
37B0000
heap
page read and write
1DDF2520000
heap
page read and write
7E174FF000
stack
page read and write
7E178FD000
stack
page read and write
37D1000
heap
page read and write
4882000
heap
page read and write
B0000
unkown
page readonly
37D1000
heap
page read and write
7FF63B850000
unkown
page readonly
95F19FF000
stack
page read and write
37D1000
heap
page read and write
4383000
heap
page read and write
3B5A000
heap
page read and write
D90000
heap
page read and write
3BE0000
heap
page read and write
3B7A000
heap
page read and write
3CAA000
heap
page read and write
120E000
stack
page read and write
DB0000
heap
page read and write
3B2A000
heap
page read and write
7E176FE000
stack
page read and write
B1000
unkown
page execute read
37D1000
heap
page read and write
41AD000
heap
page read and write
37D1000
heap
page read and write
1DDF2556000
heap
page read and write
1DDF24E5000
heap
page read and write
3C7A000
heap
page read and write
37D1000
heap
page read and write
37C0000
heap
page read and write
2ABF000
heap
page read and write
3BAA000
heap
page read and write
7E179F8000
stack
page read and write
46E0000
heap
page read and write
37D1000
heap
page read and write
3C90000
heap
page read and write
3B80000
heap
page read and write
3C00000
heap
page read and write
438F000
heap
page read and write
37D1000
heap
page read and write
7FF63BB05000
unkown
page readonly
B0000
unkown
page readonly
4119000
heap
page read and write
3C00000
heap
page read and write
32C0000
heap
page read and write
3BA0000
heap
page read and write
7FF63B851000
unkown
page execute read
7FF63BB01000
unkown
page write copy
3C8A000
heap
page read and write
28888E30000
heap
page read and write
3CA0000
heap
page read and write
4167000
heap
page read and write
3B80000
heap
page read and write
438A000
heap
page read and write
37D1000
heap
page read and write
37BA000
heap
page read and write
37D1000
heap
page read and write
3B4A000
heap
page read and write
3B70000
heap
page read and write
B2000
unkown
page readonly
DFE000
stack
page read and write
D1C000
stack
page read and write
37D1000
heap
page read and write
7FF63BB05000
unkown
page readonly
4107000
heap
page read and write
4380000
heap
page read and write
7E17AFB000
stack
page read and write
37D1000
heap
page read and write
4199000
heap
page read and write
7FF63BB02000
unkown
page write copy
BBA000
heap
page read and write
2D10000
heap
page read and write
10FC000
stack
page read and write
438B000
heap
page read and write
1DDF4280000
heap
page read and write
37D1000
heap
page read and write
7FF63B8ED000
unkown
page readonly
3C40000
heap
page read and write
3BD0000
heap
page read and write
3CC4000
heap
page read and write
7E177FE000
stack
page read and write
41B4000
heap
page read and write
7FF63B8ED000
unkown
page readonly
28888F03000
heap
page read and write
3C80000
heap
page read and write
1DDF23C0000
heap
page read and write
B2000
unkown
page readonly
3B20000
heap
page read and write
37D1000
heap
page read and write
140F000
stack
page read and write
4189000
heap
page read and write
95F1BFD000
stack
page read and write
7FF63B8EC000
unkown
page write copy
170F000
stack
page read and write
7E173FF000
stack
page read and write
B2000
unkown
page readonly
3C70000
heap
page read and write
B3A000
heap
page read and write
3CBA000
heap
page read and write
B70000
heap
page read and write
2704000
heap
page read and write
7FF63BAF5000
unkown
page readonly
1DDF24C0000
heap
page read and write
7FF63B851000
unkown
page execute read
3B50000
heap
page read and write
37D1000
heap
page read and write
26FB000
heap
page read and write
438A000
heap
page read and write
4130000
heap
page read and write
4150000
heap
page read and write
3BF0000
heap
page read and write
4883000
heap
page read and write
37D1000
heap
page read and write
7E16D4A000
stack
page read and write
37D1000
heap
page read and write
7FF63B8EC000
unkown
page read and write
28888E00000
heap
page read and write
41D3000
heap
page read and write
4184000
heap
page read and write
121B000
heap
page read and write
B4000
unkown
page readonly
37CA000
heap
page read and write
25E1000
heap
page read and write
B1000
unkown
page execute read
1210000
heap
page read and write
419C000
heap
page read and write
3BEA000
heap
page read and write
37D1000
heap
page read and write
4383000
heap
page read and write
7E170FE000
stack
page read and write
B0000
unkown
page readonly
7FF63BAF5000
unkown
page readonly
7E171FE000
stack
page read and write
B4000
unkown
page readonly
3C9A000
heap
page read and write
There are 177 hidden memdumps, click here to show them.