IOC Report
018292540-LetterReguranPPI-20230814215304.PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
018292540-LetterReguranPPI-20230814215304.PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\018292540-LetterReguranPPI-20230814215304.PDF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\pdf\logs.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\018292540-LetterReguranPPI-20230814215304.PDF.exe
"C:\Users\user\Desktop\018292540-LetterReguranPPI-20230814215304.PDF.exe"
malicious
C:\Users\user\Desktop\018292540-LetterReguranPPI-20230814215304.PDF.exe
"C:\Users\user\Desktop\018292540-LetterReguranPPI-20230814215304.PDF.exe"
malicious

URLs

Name
IP
Malicious
oyo.work.gd
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gpl
unknown

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
oyo.work.gd
154.216.20.185

IPs

IP
Domain
Country
Malicious
178.237.33.50
geoplugin.net
Netherlands
154.216.20.185
oyo.work.gd
Seychelles

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\jkm-I9KENP
exepath
HKEY_CURRENT_USER\SOFTWARE\jkm-I9KENP
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
117A000
heap
page read and write
malicious
4CD7000
trusted library allocation
page read and write
malicious
41D9000
trusted library allocation
page read and write
malicious
3B2E000
stack
page read and write
1592000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
5B80000
heap
page read and write
1368000
heap
page read and write
5700000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page read and write
159B000
trusted library allocation
page execute and read and write
1348000
heap
page read and write
5900000
trusted library allocation
page read and write
56F3000
heap
page read and write
11D5000
heap
page read and write
562E000
trusted library allocation
page read and write
F90000
heap
page read and write
73A0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
56F0000
heap
page read and write
73FE000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
158A000
trusted library allocation
page execute and read and write
B98E000
stack
page read and write
31D1000
trusted library allocation
page read and write
5B50000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
316F000
stack
page read and write
181F000
stack
page read and write
BB8E000
stack
page read and write
1423000
heap
page read and write
73EE000
stack
page read and write
1457000
heap
page read and write
58D0000
heap
page read and write
11DC000
heap
page read and write
7360000
trusted library allocation
page read and write
475000
remote allocation
page execute and read and write
914E000
stack
page read and write
13E3000
heap
page read and write
1564000
trusted library allocation
page read and write
563D000
trusted library allocation
page read and write
FF0000
heap
page read and write
5910000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
BD8F000
stack
page read and write
924E000
stack
page read and write
13DB000
heap
page read and write
15B0000
trusted library allocation
page read and write
784E000
stack
page read and write
BE8F000
stack
page read and write
11C3000
heap
page read and write
2DEC000
stack
page read and write
1582000
trusted library allocation
page read and write
B9CE000
stack
page read and write
9010000
heap
page read and write
302F000
stack
page read and write
2EEF000
stack
page read and write
5B75000
heap
page read and write
11A6000
heap
page read and write
58E0000
heap
page read and write
1600000
trusted library allocation
page execute and read and write
5631000
trusted library allocation
page read and write
F7C000
stack
page read and write
31AE000
stack
page read and write
579B000
stack
page read and write
E7C000
stack
page read and write
2C60000
heap
page read and write
5840000
trusted library section
page readonly
7260000
heap
page read and write
73F5000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
2F2C000
stack
page read and write
5640000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5920000
heap
page execute and read and write
1411000
heap
page read and write
156D000
trusted library allocation
page execute and read and write
1167000
heap
page read and write
904C000
heap
page read and write
471000
remote allocation
page execute and read and write
1450000
heap
page read and write
5650000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
52CC000
stack
page read and write
9047000
heap
page read and write
5BB0000
heap
page read and write
306E000
stack
page read and write
5A40000
heap
page read and write
1573000
trusted library allocation
page read and write
1480000
heap
page read and write
5CA0000
trusted library allocation
page execute and read and write
5720000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
5B90000
heap
page read and write
934E000
stack
page read and write
1160000
heap
page read and write
1597000
trusted library allocation
page execute and read and write
5642000
trusted library allocation
page read and write
FA0000
heap
page read and write
7740000
trusted library section
page read and write
1580000
trusted library allocation
page read and write
133E000
stack
page read and write
1610000
heap
page read and write
1563000
trusted library allocation
page execute and read and write
5C90000
trusted library allocation
page execute and read and write
2CAE000
stack
page read and write
FC0000
heap
page read and write
5670000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
5B4D000
stack
page read and write
1586000
trusted library allocation
page execute and read and write
5710000
trusted library allocation
page execute and read and write
2FFC000
stack
page read and write
13EC000
heap
page read and write
3028000
trusted library allocation
page read and write
3C2F000
stack
page read and write
12F7000
stack
page read and write
1382000
heap
page read and write
32AF000
stack
page read and write
5C80000
trusted library section
page read and write
FEE000
stack
page read and write
F2A000
stack
page read and write
3010000
heap
page read and write
56E0000
heap
page read and write
32D0000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
5B70000
heap
page read and write
7962000
trusted library allocation
page read and write
15FE000
stack
page read and write
134E000
heap
page read and write
30C0000
heap
page execute and read and write
726E000
heap
page read and write
1560000
trusted library allocation
page read and write
1110000
heap
page read and write
BC8F000
stack
page read and write
2DAF000
stack
page read and write
743E000
stack
page read and write
3246000
trusted library allocation
page read and write
DB0000
unkown
page readonly
11B6000
heap
page read and write
31CE000
stack
page read and write
3000000
trusted library allocation
page read and write
DB2000
unkown
page readonly
171F000
stack
page read and write
1340000
heap
page read and write
There are 143 hidden memdumps, click here to show them.