IOC Report
SOA SEP 2024.exe

loading gif

Files

File Path
Type
Category
Malicious
SOA SEP 2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut6260.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bankrupture
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SOA SEP 2024.exe
"C:\Users\user\Desktop\SOA SEP 2024.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\SOA SEP 2024.exe"
malicious

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
193.122.130.0
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
104.21.67.152
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.67.152
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
104.21.67.152
reallyfreegeoip.org
United States
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5750000
trusted library section
page read and write
malicious
3359000
trusted library allocation
page read and write
malicious
4171000
trusted library allocation
page read and write
malicious
31D9000
trusted library allocation
page read and write
malicious
2EA4000
heap
page read and write
malicious
5650000
trusted library section
page read and write
malicious
DEF000
heap
page read and write
137D000
trusted library allocation
page execute and read and write
1392000
trusted library allocation
page read and write
E0E000
heap
page read and write
610000
heap
page read and write
382E000
direct allocation
page read and write
7ED000
unkown
page readonly
31AB000
trusted library allocation
page read and write
3690000
direct allocation
page read and write
151E000
stack
page read and write
E40000
heap
page read and write
1451000
heap
page read and write
31A3000
trusted library allocation
page read and write
382E000
direct allocation
page read and write
3613000
direct allocation
page read and write
31C9000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
824000
unkown
page readonly
31B4000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
5940000
heap
page read and write
C4E000
stack
page read and write
6B0000
heap
page read and write
32E8000
trusted library allocation
page read and write
319F000
trusted library allocation
page read and write
6B9E000
stack
page read and write
32A4000
trusted library allocation
page read and write
43B000
system
page execute and read and write
3186000
trusted library allocation
page read and write
3613000
direct allocation
page read and write
E0E000
heap
page read and write
5AE000
stack
page read and write
1240000
heap
page read and write
D2A000
heap
page read and write
6BA0000
trusted library allocation
page execute and read and write
37BD000
direct allocation
page read and write
E75000
heap
page read and write
D5C000
heap
page read and write
309E000
trusted library allocation
page read and write
D66000
heap
page read and write
34F0000
direct allocation
page read and write
520000
heap
page read and write
34F0000
direct allocation
page read and write
530E000
stack
page read and write
D4C000
heap
page read and write
6CA0000
heap
page read and write
3191000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
37BD000
direct allocation
page read and write
34F0000
direct allocation
page read and write
1374000
trusted library allocation
page read and write
5D7E000
stack
page read and write
685D000
stack
page read and write
6CE0000
heap
page read and write
3690000
direct allocation
page read and write
382E000
direct allocation
page read and write
81A000
unkown
page write copy
318E000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
2E30000
heap
page read and write
6A0000
heap
page read and write
2E80000
heap
page read and write
6D00000
trusted library allocation
page execute and read and write
15CE000
stack
page read and write
E40000
heap
page read and write
3340000
trusted library allocation
page read and write
E77000
heap
page read and write
80E000
unkown
page readonly
3410000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
E40000
heap
page read and write
6B4000
heap
page read and write
6C0000
direct allocation
page read and write
13D8000
heap
page read and write
3613000
direct allocation
page read and write
31A9000
trusted library allocation
page read and write
139A000
trusted library allocation
page execute and read and write
31A1000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
31AD000
trusted library allocation
page read and write
1245000
heap
page read and write
56E000
stack
page read and write
DC0000
heap
page read and write
5EC0000
trusted library allocation
page read and write
F69000
heap
page read and write
1436000
heap
page read and write
3338000
trusted library allocation
page read and write
D2E000
heap
page read and write
824000
unkown
page readonly
3690000
direct allocation
page read and write
37B9000
direct allocation
page read and write
3171000
trusted library allocation
page read and write
140D000
heap
page read and write
3140000
trusted library allocation
page read and write
D90000
heap
page read and write
6C70000
trusted library allocation
page read and write
D20000
heap
page read and write
30B1000
trusted library allocation
page read and write
13A7000
trusted library allocation
page execute and read and write
1396000
trusted library allocation
page execute and read and write
382E000
direct allocation
page read and write
32CE000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
1463000
heap
page read and write
31A5000
trusted library allocation
page read and write
4266000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
E40000
heap
page read and write
134E000
stack
page read and write
D6A000
heap
page read and write
760000
unkown
page readonly
E0E000
heap
page read and write
6A9E000
stack
page read and write
13C3000
heap
page read and write
37B9000
direct allocation
page read and write
E75000
heap
page read and write
3120000
heap
page execute and read and write
6C10000
trusted library allocation
page read and write
37BD000
direct allocation
page read and write
3690000
direct allocation
page read and write
D2A000
stack
page read and write
6BF0000
trusted library allocation
page read and write
310E000
stack
page read and write
3613000
direct allocation
page read and write
3188000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
DDE000
stack
page read and write
400000
system
page execute and read and write
5690000
trusted library allocation
page execute and read and write
D66000
heap
page read and write
3690000
direct allocation
page read and write
2DBE000
stack
page read and write
31D7000
trusted library allocation
page read and write
6BB6000
trusted library allocation
page read and write
E77000
heap
page read and write
317C000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
E77000
heap
page read and write
37BD000
direct allocation
page read and write
7ED000
unkown
page readonly
31D5000
trusted library allocation
page read and write
E77000
heap
page read and write
F00000
heap
page read and write
6A1E000
stack
page read and write
308E000
stack
page read and write
E0E000
heap
page read and write
34F0000
direct allocation
page read and write
D66000
heap
page read and write
E77000
heap
page read and write
37B9000
direct allocation
page read and write
3690000
direct allocation
page read and write
3423000
trusted library allocation
page read and write
D66000
heap
page execute and read and write
DA2000
heap
page read and write
1449000
heap
page read and write
32F4000
trusted library allocation
page read and write
E0E000
heap
page read and write
1370000
trusted library allocation
page read and write
E40000
heap
page read and write
C5D000
stack
page read and write
E40000
heap
page read and write
3416000
trusted library allocation
page read and write
5A44000
heap
page read and write
31BA000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
13AB000
trusted library allocation
page execute and read and write
382E000
direct allocation
page read and write
81F000
unkown
page write copy
318C000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
E77000
heap
page read and write
D6A000
heap
page read and write
DE0000
heap
page read and write
3160000
heap
page read and write
6BC0000
trusted library allocation
page execute and read and write
1CA000
stack
page read and write
191F000
stack
page read and write
3453000
trusted library allocation
page read and write
761000
unkown
page execute read
D6F000
heap
page read and write
382E000
direct allocation
page read and write
2DE0000
heap
page read and write
3613000
direct allocation
page read and write
3613000
direct allocation
page read and write
30B6000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
37B9000
direct allocation
page read and write
13C0000
heap
page read and write
E75000
heap
page read and write
37BD000
direct allocation
page read and write
761000
unkown
page execute read
1383000
trusted library allocation
page read and write
E75000
heap
page read and write
68DE000
stack
page read and write
341D000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page execute and read and write
41FF000
trusted library allocation
page read and write
4272000
trusted library allocation
page read and write
33ED000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
E75000
heap
page read and write
120E000
stack
page read and write
31A7000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
760000
unkown
page readonly
E0E000
heap
page read and write
13D0000
heap
page read and write
1230000
trusted library section
page read and write
1210000
heap
page read and write
31C2000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page execute and read and write
2E50000
trusted library allocation
page read and write
2E2E000
stack
page read and write
6BB4000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
13A5000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
426000
system
page execute and read and write
6C08000
trusted library allocation
page read and write
E0F000
heap
page read and write
425C000
trusted library allocation
page read and write
69DE000
stack
page read and write
31BE000
trusted library allocation
page read and write
34F0000
direct allocation
page read and write
340C000
trusted library allocation
page read and write
1373000
trusted library allocation
page execute and read and write
3182000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
81A000
unkown
page read and write
689E000
stack
page read and write
37B9000
direct allocation
page read and write
333C000
trusted library allocation
page read and write
F69000
heap
page read and write
C7C000
stack
page read and write
E40000
heap
page read and write
1400000
heap
page read and write
31CB000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
80E000
unkown
page readonly
5A40000
heap
page read and write
430000
heap
page read and write
37B9000
direct allocation
page read and write
31B6000
trusted library allocation
page read and write
34F0000
direct allocation
page read and write
33E9000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
593F000
stack
page read and write
6BBA000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
5A4C000
heap
page read and write
E77000
heap
page read and write
E75000
heap
page read and write
510000
heap
page read and write
5A82000
heap
page read and write
6C01000
trusted library allocation
page read and write
5830000
heap
page execute and read and write
2E60000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
37BD000
direct allocation
page read and write
E75000
heap
page read and write
10F6000
stack
page read and write
D79000
heap
page read and write
2D70000
trusted library allocation
page read and write
6A5E000
stack
page read and write
3294000
trusted library allocation
page read and write
56FE000
stack
page read and write
4241000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
C3C000
stack
page read and write
There are 281 hidden memdumps, click here to show them.