IOC Report
MSM8C42iAN.exe

loading gif

Files

File Path
Type
Category
Malicious
MSM8C42iAN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataDqJdpmHo.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataHhUnZmvD.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataOebbnOVW.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataWctSLmwW.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataZWdrgPWC.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatansgiHqmX.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataovGFJnlG.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\LogqueintiseRngmeEXkkcAcRDShRzsDXooICEfirelit
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotAfUkbnDa.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotPCPZmWJw.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotRmCCGgAk.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotmIUnEnEe.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotuCjDoATa.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotwoFBNXXE.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\ScreenshotyVquSyRx.BMP
PC bitmap, Windows 3.x format, 1280 x 1024 x 24, image size 3932160, cbSize 3932214, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\WebData
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\cookies.db
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\cookies.db-shm
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MSM8C42iAN.exe
"C:\Users\user\Desktop\MSM8C42iAN.exe"
malicious
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://showip.net/1
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot8165068013:AAFuCn4n-0ULh45xSnNPfqymllZH1zW0UYM/sendDocument?chat_id=
unknown
https://api.telegram.org/bot8165068013:AAFuCn4n-0ULh45xSnNPfqymllZH1zW0UYM/sendDocument?chat_id=6115
unknown
https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://showip.net/
unknown
https://unpkg.com/leaflet
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://showip.net/?checkip=
unknown
http://showip.net.
unknown
https://www.ecosia.org/newtab/
unknown
http://showip.net/
unknown
http://showip.net
unknown
http://showip.net4
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://showip.netll
unknown
http://schema.org
unknown
https://api.telegram.org/bot8165068013:AAFuCn4n-0ULh45xSnNPfqymllZH1zW0UYM/sendDocument?chat_id=6115850689&caption=DC-KL:::user-PC\user\8.46.123.75
149.154.167.220
https://api.telegram.org/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.openstreetmap.org/copyright
unknown
http://showip.netd
unknown
https://api.telegram.org/abcdefghijklmnopqrstuvwxyz
unknown
https://api.telegram.org/bot8165068013:AAFuCn4n-0ULh45xSnNPfqymllZH1zW0UYM/sendDocument?chat_id=6115850689&caption=DC-SC:::user-PC\user\8.46.123.75
149.154.167.220
http://www.maxmind.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://showip.netpD
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
showip.net
162.55.60.2
s-part-0035.t-0009.t-msedge.net
13.107.246.63
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
162.55.60.2
showip.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute and write copy
malicious
5C1000
heap
page read and write
42A4000
heap
page read and write
5AE000
heap
page read and write
5F1000
heap
page read and write
34D6000
heap
page read and write
616000
heap
page read and write
345E000
heap
page read and write
5FF000
heap
page read and write
5E5000
heap
page read and write
605000
heap
page read and write
600000
heap
page read and write
61F000
heap
page read and write
65F000
heap
page read and write
3451000
heap
page read and write
66FC000
heap
page read and write
40F1000
heap
page read and write
688E000
heap
page read and write
60A000
heap
page read and write
5FF000
heap
page read and write
65C000
heap
page read and write
5F61000
heap
page read and write
4ABF000
heap
page read and write
5C1000
heap
page read and write
5D8000
heap
page read and write
3493000
heap
page read and write
600000
heap
page read and write
34D6000
heap
page read and write
400000
unkown
page readonly
5D6000
heap
page read and write
416F000
heap
page read and write
44A000
unkown
page readonly
3457000
heap
page read and write
5EF000
heap
page read and write
60F2000
heap
page read and write
34D6000
heap
page read and write
5D8000
heap
page read and write
467C000
heap
page read and write
60F000
heap
page read and write
348B000
heap
page read and write
3467000
heap
page read and write
5C1000
heap
page read and write
504F000
heap
page read and write
61F000
heap
page read and write
641000
heap
page read and write
5D0000
heap
page read and write
3493000
heap
page read and write
3493000
heap
page read and write
4BBD000
heap
page read and write
51D3000
heap
page read and write
60A000
heap
page read and write
3570000
remote allocation
page read and write
5D5000
heap
page read and write
3493000
heap
page read and write
5C1000
heap
page read and write
3609000
heap
page read and write
61F000
heap
page read and write
5BC000
heap
page read and write
5CB000
heap
page read and write
5CF000
heap
page read and write
5C6000
heap
page read and write
4A41000
heap
page read and write
5C7000
heap
page read and write
5043000
heap
page read and write
61F000
heap
page read and write
3463000
heap
page read and write
5E0000
heap
page read and write
57D2000
heap
page read and write
5CE000
heap
page read and write
3D20000
heap
page read and write
5F1000
heap
page read and write
42A5000
heap
page read and write
5E4000
heap
page read and write
3570000
remote allocation
page read and write
607000
heap
page read and write
5A8000
heap
page read and write
5CC000
heap
page read and write
5FC000
heap
page read and write
65C000
heap
page read and write
5C6000
heap
page read and write
5F1000
heap
page read and write
5EF000
heap
page read and write
5FF000
heap
page read and write
5FC000
heap
page read and write
4677000
heap
page read and write
5FD000
heap
page read and write
3601000
heap
page read and write
5BE000
heap
page read and write
701B000
heap
page read and write
60A000
heap
page read and write
5CA000
heap
page read and write
5D3000
heap
page read and write
5CB000
heap
page read and write
346B000
heap
page read and write
346B000
heap
page read and write
4B3E000
heap
page read and write
5BE000
heap
page read and write
5C7000
heap
page read and write
5E1000
heap
page read and write
5E2000
heap
page read and write
60E000
heap
page read and write
5965000
heap
page read and write
5FF000
heap
page read and write
5CE000
heap
page read and write
5D4000
heap
page read and write
65F000
heap
page read and write
3D26000
heap
page read and write
664000
heap
page read and write
4C41000
heap
page read and write
616000
heap
page read and write
34D6000
heap
page read and write
616000
heap
page read and write
616000
heap
page read and write
664000
heap
page read and write
605000
heap
page read and write
667000
heap
page read and write
4A40000
heap
page read and write
60A000
heap
page read and write
5F7000
heap
page read and write
42AE000
heap
page read and write
345A000
heap
page read and write
5BC000
heap
page read and write
607000
heap
page read and write
5FF000
heap
page read and write
348B000
heap
page read and write
5E2000
heap
page read and write
3451000
heap
page read and write
3466000
heap
page read and write
3570000
remote allocation
page read and write
467A000
heap
page read and write
42A4000
heap
page read and write
There are 121 hidden memdumps, click here to show them.