IOC Report
DHL AWB_NO_9078538809.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL AWB_NO_9078538809.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL AWB_NO_9078538809.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpECF0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GAmFKUIDBo.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_di0oxyq3.4gm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_em3hefzd.oli.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fdnkqmoe.nxi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhguzsjp.mc4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF888.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL AWB_NO_9078538809.exe
"C:\Users\user\Desktop\DHL AWB_NO_9078538809.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GAmFKUIDBo" /XML "C:\Users\user\AppData\Local\Temp\tmpECF0.tmp"
malicious
C:\Users\user\Desktop\DHL AWB_NO_9078538809.exe
"C:\Users\user\Desktop\DHL AWB_NO_9078538809.exe"
malicious
C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe
C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GAmFKUIDBo" /XML "C:\Users\user\AppData\Local\Temp\tmpF888.tmp"
malicious
C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe
"C:\Users\user\AppData\Roaming\GAmFKUIDBo.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
windowsupdateserveraug.duckdns.org
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.sakkal.com08
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://geoplugin.net/json.gp
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
windowsupdateserveraug.duckdns.org
185.214.10.225
malicious

IPs

IP
Domain
Country
Malicious
185.214.10.225
windowsupdateserveraug.duckdns.org
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\msc-XYOFLE
exepath
HKEY_CURRENT_USER\SOFTWARE\msc-XYOFLE
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
41DF000
trusted library allocation
page read and write
malicious
36B1000
trusted library allocation
page read and write
malicious
12C7000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1317000
heap
page read and write
malicious
4FE0000
trusted library section
page read and write
malicious
4D70000
heap
page execute and read and write
C20000
trusted library allocation
page read and write
6F0000
heap
page read and write
73F9000
heap
page read and write
9C0000
heap
page read and write
9A2E000
stack
page read and write
AD000
stack
page read and write
CF4000
trusted library allocation
page read and write
952000
trusted library allocation
page read and write
12BF000
stack
page read and write
4DF5000
heap
page read and write
25EE000
stack
page read and write
D30000
trusted library allocation
page read and write
C97000
heap
page read and write
28BF000
stack
page read and write
4D21000
trusted library allocation
page read and write
1DF000
unkown
page read and write
5AA000
stack
page read and write
B10000
heap
page read and write
CFC000
stack
page read and write
CF0000
trusted library allocation
page read and write
CFB000
trusted library allocation
page read and write
5020000
heap
page read and write
3BEF000
trusted library allocation
page read and write
27B0000
heap
page read and write
2C5F000
stack
page read and write
6F7000
stack
page read and write
CB0000
trusted library allocation
page read and write
B7E000
stack
page read and write
CA4000
trusted library allocation
page read and write
50E000
stack
page read and write
2E70000
heap
page read and write
11B0000
heap
page read and write
6D90000
trusted library allocation
page read and write
D0E000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
25F5000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
3780000
heap
page read and write
12C0000
heap
page read and write
AE0000
trusted library allocation
page read and write
4D73000
heap
page read and write
9CAF000
stack
page read and write
980000
heap
page read and write
3337000
heap
page read and write
BCE000
stack
page read and write
3330000
heap
page read and write
B0B000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
117E000
stack
page read and write
5070000
heap
page execute and read and write
9B2F000
stack
page read and write
278C000
stack
page read and write
9DEF000
stack
page read and write
4D32000
trusted library allocation
page read and write
2680000
trusted library allocation
page execute and read and write
729E000
stack
page read and write
7FA90000
trusted library allocation
page execute and read and write
4E10000
heap
page read and write
4FEB000
stack
page read and write
2720000
trusted library allocation
page read and write
4D82000
trusted library allocation
page read and write
ADD000
trusted library allocation
page execute and read and write
956000
trusted library allocation
page execute and read and write
2690000
heap
page execute and read and write
150F000
stack
page read and write
9F6B000
stack
page read and write
3A2C000
trusted library allocation
page read and write
69E0000
heap
page read and write
5320000
trusted library allocation
page read and write
5040000
heap
page read and write
4465000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
58F0000
heap
page read and write
EA000
stack
page read and write
A0AD000
stack
page read and write
F10000
heap
page read and write
B80000
trusted library allocation
page read and write
830000
heap
page read and write
25F0000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
11EF000
stack
page read and write
97EE000
stack
page read and write
A3E000
stack
page read and write
DFC000
stack
page read and write
A37000
heap
page read and write
9BAE000
stack
page read and write
AD4000
trusted library allocation
page read and write
353F000
unkown
page read and write
4FBE000
stack
page read and write
72DF000
stack
page read and write
5025000
heap
page read and write
93E000
stack
page read and write
4D70000
heap
page read and write
DDE000
stack
page read and write
940000
trusted library allocation
page read and write
A6A000
heap
page read and write
6DA7000
trusted library allocation
page read and write
4D1B000
stack
page read and write
5080000
heap
page read and write
A450000
trusted library allocation
page execute and read and write
4E00000
heap
page read and write
4CC0000
trusted library allocation
page read and write
A33C000
stack
page read and write
2688000
trusted library allocation
page read and write
4D2D000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
759F000
stack
page read and write
6B2E000
heap
page read and write
6D1F000
stack
page read and write
32C0000
heap
page read and write
4D1E000
trusted library allocation
page read and write
9CAE000
stack
page read and write
3CE000
stack
page read and write
B07000
trusted library allocation
page execute and read and write
CA6000
trusted library allocation
page read and write
80D000
stack
page read and write
47AC000
stack
page read and write
28C1000
trusted library allocation
page read and write
910000
heap
page read and write
B50000
heap
page read and write
9A7000
heap
page read and write
B53000
heap
page read and write
C6E000
stack
page read and write
CC0000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
A0BE000
stack
page read and write
A77000
heap
page read and write
521E000
stack
page read and write
3B36000
trusted library allocation
page read and write
4D30000
heap
page read and write
9C7000
heap
page read and write
3310000
heap
page read and write
824000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page read and write
B02000
trusted library allocation
page read and write
190000
unkown
page readonly
EFB000
stack
page read and write
2672000
trusted library allocation
page read and write
D47000
heap
page read and write
5150000
trusted library allocation
page execute and read and write
192000
unkown
page readonly
38C1000
trusted library allocation
page read and write
102E000
stack
page read and write
96B000
trusted library allocation
page execute and read and write
C90000
heap
page read and write
5030000
heap
page read and write
370000
heap
page read and write
A1AF000
stack
page read and write
2660000
heap
page read and write
9F2E000
stack
page read and write
C10000
trusted library allocation
page execute and read and write
73B6000
heap
page read and write
A1C0000
trusted library allocation
page execute and read and write
6C57000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
35BF000
stack
page read and write
73A0000
heap
page read and write
6DEE000
stack
page read and write
6AE0000
heap
page read and write
CC5000
trusted library allocation
page read and write
5130000
trusted library allocation
page execute and read and write
330E000
unkown
page read and write
BD0000
heap
page read and write
6DA0000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
32B0000
heap
page read and write
7F350000
trusted library allocation
page execute and read and write
6B12000
heap
page read and write
5220000
trusted library allocation
page execute and read and write
6D50000
trusted library allocation
page execute and read and write
A06C000
stack
page read and write
A43C000
stack
page read and write
6FB000
heap
page read and write
38F3000
trusted library allocation
page read and write
A1FE000
stack
page read and write
6AFD000
heap
page read and write
26A0000
heap
page read and write
810000
trusted library allocation
page read and write
A2FF000
stack
page read and write
4D04000
trusted library allocation
page read and write
AD3000
trusted library allocation
page execute and read and write
49BC000
stack
page read and write
967000
trusted library allocation
page execute and read and write
70FE000
stack
page read and write
5230000
heap
page read and write
5010000
trusted library allocation
page read and write
108E000
stack
page read and write
B1E000
heap
page read and write
12FE000
stack
page read and write
988000
heap
page read and write
2670000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
4D60000
heap
page read and write
739F000
stack
page read and write
820000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
4DE0000
trusted library section
page readonly
2CD0000
heap
page read and write
CA0000
trusted library allocation
page read and write
AF6000
trusted library allocation
page execute and read and write
9C3000
heap
page read and write
CD0000
heap
page read and write
7404000
heap
page read and write
3A71000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
3279000
stack
page read and write
98E000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
95A000
trusted library allocation
page execute and read and write
AF2000
trusted library allocation
page read and write
4BA0000
heap
page read and write
A6D000
heap
page read and write
1060000
heap
page read and write
6C1E000
stack
page read and write
2620000
trusted library allocation
page read and write
9CEE000
stack
page read and write
A9E000
stack
page read and write
6FE0000
trusted library section
page read and write
C30000
trusted library allocation
page read and write
30A000
stack
page read and write
323D000
stack
page read and write
BAC000
stack
page read and write
150000
heap
page read and write
B44000
heap
page read and write
BF2000
heap
page read and write
AD0000
trusted library allocation
page read and write
1030000
heap
page read and write
99F000
heap
page read and write
9F3F000
stack
page read and write
6C9E000
stack
page read and write
D1D000
trusted library allocation
page read and write
C40000
heap
page read and write
9E3D000
stack
page read and write
2DDF000
stack
page read and write
AF0000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
9F7E000
stack
page read and write
46E000
remote allocation
page execute and read and write
506E000
heap
page read and write
2790000
trusted library allocation
page read and write
980000
heap
page read and write
C0C000
stack
page read and write
C80000
trusted library allocation
page read and write
43EF000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
4DDA000
trusted library allocation
page read and write
9BAE000
stack
page read and write
B1A000
heap
page read and write
C58000
trusted library allocation
page read and write
19E000
unkown
page read and write
4D50000
trusted library allocation
page execute and read and write
4D00000
trusted library allocation
page read and write
6732000
trusted library allocation
page read and write
EDF000
stack
page read and write
962000
trusted library allocation
page read and write
357E000
stack
page read and write
2740000
heap
page execute and read and write
D40000
heap
page read and write
10CD000
stack
page read and write
C70000
trusted library allocation
page execute and read and write
A1BE000
stack
page read and write
4D40000
heap
page read and write
1180000
heap
page read and write
6C50000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
4DF0000
heap
page read and write
380000
heap
page read and write
BC0000
heap
page read and write
9E2E000
stack
page read and write
4D20000
trusted library section
page readonly
6CDD000
stack
page read and write
3A44000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
8F7000
stack
page read and write
507C000
heap
page read and write
950000
trusted library allocation
page read and write
1E0000
heap
page read and write
A07E000
stack
page read and write
4D90000
trusted library allocation
page execute and read and write
6B10000
heap
page read and write
54F000
stack
page read and write
4DE4000
trusted library section
page readonly
823000
trusted library allocation
page execute and read and write
98EE000
stack
page read and write
AFA000
trusted library allocation
page execute and read and write
4CD0000
heap
page read and write
38DE000
trusted library allocation
page read and write
4BA3000
heap
page read and write
570000
heap
page read and write
10E0000
heap
page read and write
39B7000
trusted library allocation
page read and write
6D30000
trusted library allocation
page execute and read and write
82D000
trusted library allocation
page execute and read and write
D11000
trusted library allocation
page read and write
D16000
trusted library allocation
page read and write
58E0000
heap
page read and write
AED000
trusted library allocation
page execute and read and write
475000
remote allocation
page execute and read and write
9F0000
heap
page read and write
2600000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
4D8B000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
A50000
heap
page read and write
There are 304 hidden memdumps, click here to show them.