IOC Report
Purchase Inquiry_002.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Inquiry_002.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Inquiry_002.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3EA3.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\ios\logs.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xASiLfzXONGIW.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_33v4kdys.yge.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ryrwtse.3j2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_43yswqfg.a4e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1iadovm.elz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ul5pcprh.0rg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_un2hzs0q.jig.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xb5laily.wjp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xgkyn1bq.i3f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4FBA.tmp
XML 1.0 document, ASCII text
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Inquiry_002.exe
"C:\Users\user\Desktop\Purchase Inquiry_002.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Inquiry_002.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xASiLfzXONGIW" /XML "C:\Users\user\AppData\Local\Temp\tmp3EA3.tmp"
malicious
C:\Users\user\Desktop\Purchase Inquiry_002.exe
"C:\Users\user\Desktop\Purchase Inquiry_002.exe"
malicious
C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe
C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xASiLfzXONGIW" /XML "C:\Users\user\AppData\Local\Temp\tmp4FBA.tmp"
malicious
C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe
"C:\Users\user\AppData\Roaming\xASiLfzXONGIW.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
cee.work.gd
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gp7
unknown
http://geoplugin.net/json.gp/C
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
unknown
http://geoplugin.net/json.gpSystem32
unknown

Domains

Name
IP
Malicious
cee.work.gd
154.216.19.141
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
154.216.19.141
cee.work.gd
Seychelles
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\gig-1IH5DX
exepath
HKEY_CURRENT_USER\SOFTWARE\gig-1IH5DX
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
3965000
trusted library allocation
page read and write
malicious
4337000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1237000
heap
page read and write
malicious
1537000
heap
page read and write
malicious
3F65000
trusted library allocation
page read and write
malicious
2F0E000
stack
page read and write
2630000
trusted library allocation
page read and write
D40000
heap
page read and write
BB5E000
stack
page read and write
2EA6000
trusted library allocation
page read and write
BD9C000
stack
page read and write
13BB000
trusted library allocation
page execute and read and write
2F6C000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
FA7000
heap
page read and write
5000000
trusted library allocation
page read and write
1510000
heap
page read and write
7156000
heap
page read and write
F80000
heap
page read and write
2F02000
trusted library allocation
page read and write
362000
unkown
page readonly
701E000
heap
page read and write
B49D000
stack
page read and write
7FE000
stack
page read and write
6E2E000
stack
page read and write
BBDE000
stack
page read and write
1530000
heap
page read and write
B65D000
stack
page read and write
716A000
heap
page read and write
4937000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
4072000
trusted library allocation
page read and write
574E000
stack
page read and write
B31E000
stack
page read and write
1274000
trusted library allocation
page read and write
FBF000
heap
page read and write
1514000
heap
page read and write
45D000
stack
page read and write
1200000
heap
page read and write
5080000
heap
page read and write
6CE0000
trusted library allocation
page read and write
49AD000
trusted library allocation
page read and write
4A22000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
BD2000
heap
page read and write
1510000
heap
page read and write
FEB000
stack
page read and write
5090000
trusted library allocation
page execute and read and write
57E0000
trusted library allocation
page execute and read and write
1296000
trusted library allocation
page execute and read and write
407E000
trusted library allocation
page read and write
4DA000
stack
page read and write
2DFC000
stack
page read and write
F7E000
stack
page read and write
2E20000
heap
page read and write
3839000
trusted library allocation
page read and write
128D000
trusted library allocation
page execute and read and write
B9F000
heap
page read and write
4D4D000
trusted library allocation
page read and write
7192000
heap
page read and write
BA1000
heap
page read and write
B51F000
stack
page read and write
49CC000
stack
page read and write
5590000
heap
page read and write
300E000
stack
page read and write
4E00000
heap
page read and write
BC0000
heap
page read and write
318C000
stack
page read and write
1095000
heap
page read and write
6F30000
trusted library section
page read and write
B45E000
stack
page read and write
96E000
stack
page read and write
4D90000
trusted library allocation
page read and write
11A0000
heap
page read and write
1564000
heap
page read and write
471000
remote allocation
page execute and read and write
129A000
trusted library allocation
page execute and read and write
B55D000
stack
page read and write
2EEF000
stack
page read and write
1370000
heap
page read and write
D5E000
stack
page read and write
1500000
trusted library allocation
page read and write
46E000
remote allocation
page execute and read and write
52B0000
trusted library allocation
page read and write
1026000
heap
page read and write
103C000
stack
page read and write
304B000
stack
page read and write
6F2E000
stack
page read and write
D70000
heap
page read and write
7122000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
5530000
heap
page read and write
5765000
heap
page read and write
B6E000
heap
page read and write
279F000
stack
page read and write
B91E000
stack
page read and write
2810000
trusted library allocation
page execute and read and write
B1DF000
stack
page read and write
BC9B000
stack
page read and write
5857000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
6BD0000
heap
page read and write
840000
heap
page read and write
BB9C000
stack
page read and write
B8DD000
stack
page read and write
32F8000
heap
page read and write
500000
heap
page read and write
2E6F000
unkown
page read and write
27A0000
heap
page read and write
530000
heap
page read and write
1273000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
B59D000
stack
page read and write
2DBE000
stack
page read and write
5360000
trusted library allocation
page read and write
13B7000
trusted library allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
BBD000
stack
page read and write
5F0E000
stack
page read and write
510000
heap
page read and write
1410000
heap
page execute and read and write
2600000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
6A20000
heap
page read and write
4DB0000
heap
page read and write
1578000
heap
page read and write
FB4000
heap
page read and write
BDDE000
stack
page read and write
5070000
heap
page read and write
269E000
stack
page read and write
B50000
trusted library allocation
page read and write
B5A0000
heap
page read and write
51C0000
heap
page read and write
2603000
trusted library allocation
page execute and read and write
5330000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
5540000
heap
page execute and read and write
B4A000
stack
page read and write
4D70000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
364F000
stack
page read and write
6C49000
heap
page read and write
B3DE000
stack
page read and write
55A0000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
5520000
trusted library section
page readonly
391E000
trusted library allocation
page read and write
8ACF000
stack
page read and write
1404000
trusted library allocation
page read and write
83F000
stack
page read and write
126F000
stack
page read and write
33CF000
stack
page read and write
262A000
trusted library allocation
page execute and read and write
4D24000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
1230000
heap
page read and write
2637000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
6D38000
trusted library allocation
page read and write
328F000
stack
page read and write
5F10000
heap
page read and write
FC1000
heap
page read and write
2EAE000
stack
page read and write
5760000
heap
page read and write
354E000
stack
page read and write
280B000
stack
page read and write
13B0000
trusted library allocation
page read and write
B87000
heap
page read and write
4DB3000
heap
page read and write
7195000
heap
page read and write
8B7E000
stack
page read and write
52A0000
heap
page read and write
1280000
trusted library allocation
page read and write
1596000
heap
page read and write
B29E000
stack
page read and write
5920000
heap
page read and write
12A0000
heap
page read and write
558B000
stack
page read and write
9B0000
heap
page read and write
BB0000
heap
page read and write
5800000
trusted library allocation
page read and write
4838000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
B2DE000
stack
page read and write
7420000
trusted library allocation
page execute and read and write
B21E000
stack
page read and write
5F21000
heap
page read and write
105B000
heap
page read and write
145E000
stack
page read and write
159C000
heap
page read and write
7350000
trusted library allocation
page execute and read and write
2F6A000
trusted library allocation
page read and write
1283000
trusted library allocation
page read and write
2622000
trusted library allocation
page read and write
AFE000
stack
page read and write
28A6000
trusted library allocation
page read and write
2820000
heap
page read and write
5930000
heap
page read and write
2E10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
52D1000
trusted library allocation
page read and write
5D7000
stack
page read and write
5310000
heap
page read and write
1406000
trusted library allocation
page read and write
ABF000
stack
page read and write
F3E000
stack
page read and write
261D000
trusted library allocation
page execute and read and write
4D20000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2E31000
trusted library allocation
page read and write
9B5000
heap
page read and write
3831000
trusted library allocation
page read and write
442000
unkown
page readonly
2613000
trusted library allocation
page read and write
B3E000
stack
page read and write
5850000
trusted library allocation
page read and write
27C0000
heap
page execute and read and write
13B2000
trusted library allocation
page read and write
51C5000
heap
page read and write
6C0D000
heap
page read and write
5060000
trusted library section
page readonly
3FB8000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
66E000
unkown
page read and write
B35E000
stack
page read and write
52DD000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
2626000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
2E05000
trusted library allocation
page read and write
EF7000
stack
page read and write
52A3000
heap
page read and write
6D7E000
stack
page read and write
49A000
stack
page read and write
1090000
heap
page read and write
C60000
heap
page read and write
3FEF000
stack
page read and write
53A000
heap
page read and write
B0DE000
stack
page read and write
B89F000
stack
page read and write
6D30000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
BEDE000
stack
page read and write
15A7000
heap
page read and write
5958000
heap
page read and write
1003000
heap
page read and write
360000
unkown
page readonly
505B000
stack
page read and write
6CC0000
trusted library allocation
page execute and read and write
4D46000
trusted library allocation
page read and write
6A0000
heap
page read and write
11B0000
heap
page read and write
F9F000
heap
page read and write
BA9B000
stack
page read and write
EEC000
stack
page read and write
F8E000
heap
page read and write
5370000
trusted library allocation
page read and write
13E0000
trusted library allocation
page execute and read and write
F88000
heap
page read and write
1292000
trusted library allocation
page read and write
4137000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
6DDE000
stack
page read and write
BFA000
stack
page read and write
5380000
trusted library allocation
page read and write
7010000
heap
page read and write
B68000
heap
page read and write
4D85000
trusted library allocation
page read and write
DBE000
unkown
page read and write
4F2C000
stack
page read and write
4D52000
trusted library allocation
page read and write
52BB000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
314F000
stack
page read and write
E5F000
stack
page read and write
6D90000
trusted library allocation
page execute and read and write
475000
remote allocation
page execute and read and write
4D2B000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
5280000
trusted library allocation
page read and write
920000
heap
page read and write
7BE000
unkown
page read and write
7130000
heap
page read and write
B660000
heap
page read and write
4E12000
trusted library allocation
page read and write
263B000
trusted library allocation
page execute and read and write
13AF000
stack
page read and write
5320000
heap
page read and write
B41E000
stack
page read and write
B7DE000
stack
page read and write
1468000
trusted library allocation
page read and write
2F20000
heap
page read and write
5802000
trusted library allocation
page read and write
32F0000
heap
page read and write
5010000
trusted library allocation
page read and write
113C000
stack
page read and write
2610000
trusted library allocation
page read and write
B9DE000
stack
page read and write
6CB0000
trusted library section
page read and write
5340000
trusted library allocation
page execute and read and write
BD1E000
stack
page read and write
1250000
heap
page read and write
890000
heap
page read and write
57F0000
trusted library allocation
page read and write
B79D000
stack
page read and write
BCDE000
stack
page read and write
BC5F000
stack
page read and write
127D000
trusted library allocation
page execute and read and write
4D60000
trusted library allocation
page read and write
3EFE000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
B81E000
stack
page read and write
15B0000
heap
page read and write
977000
heap
page read and write
C41000
heap
page read and write
4E50000
heap
page read and write
2632000
trusted library allocation
page read and write
B6DE000
stack
page read and write
52CE000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
52CD000
stack
page read and write
3EEE000
stack
page read and write
BE1E000
stack
page read and write
970000
heap
page read and write
32CE000
stack
page read and write
55C0000
trusted library allocation
page read and write
260D000
trusted library allocation
page execute and read and write
4DC0000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
B60000
heap
page read and write
730F000
stack
page read and write
52D6000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
5950000
heap
page read and write
734E000
stack
page read and write
There are 331 hidden memdumps, click here to show them.