IOC Report
DJ5PhUwOsM.exe

loading gif

Files

File Path
Type
Category
Malicious
DJ5PhUwOsM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DJ5PhUwOsM.exe
"C:\Users\user\Desktop\DJ5PhUwOsM.exe"
malicious
C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
"C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe"
malicious
C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
"C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe"
malicious

URLs

Name
IP
Malicious
89.40.31.232
malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024
149.154.167.220
https://api.ipify.org/t
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://microsoft.co
unknown

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
89.40.31.232
unknown
Romania
malicious
162.254.34.31
unknown
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
FileDirectory
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
404000
unkown
page readonly
malicious
FA2000
unkown
page readonly
malicious
28D9000
trusted library allocation
page read and write
malicious
404000
unkown
page readonly
malicious
3341000
trusted library allocation
page read and write
malicious
4D2000
unkown
page readonly
malicious
28B1000
trusted library allocation
page read and write
malicious
1C1DB000
heap
page read and write
645E000
stack
page read and write
495D000
stack
page read and write
78E000
heap
page read and write
1755000
heap
page read and write
CFE000
stack
page read and write
4CB6000
trusted library allocation
page read and write
1C00E000
stack
page read and write
1C136000
heap
page read and write
14A9000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1409000
heap
page read and write
BF0000
heap
page read and write
4CC2000
trusted library allocation
page read and write
640000
heap
page read and write
E87000
heap
page read and write
3160000
heap
page execute and read and write
1BF0E000
stack
page read and write
1413000
heap
page read and write
E6E000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
1370000
heap
page read and write
910000
heap
page read and write
9C4000
heap
page read and write
635E000
stack
page read and write
1C15A000
heap
page read and write
4E6C000
stack
page read and write
2BDF000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
599000
stack
page read and write
1CF5C000
stack
page read and write
951000
heap
page read and write
6497000
trusted library allocation
page read and write
1B6CB000
heap
page read and write
13341000
trusted library allocation
page read and write
31E0000
heap
page execute and read and write
4CCE000
trusted library allocation
page read and write
5E0000
heap
page read and write
64F0000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page execute and read and write
2690000
trusted library allocation
page read and write
658E000
stack
page read and write
1CD5A000
stack
page read and write
1F0000
heap
page read and write
1BE04000
stack
page read and write
E07000
trusted library allocation
page execute and read and write
BE0000
trusted library allocation
page read and write
BDD000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
BC4000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
E0B000
trusted library allocation
page execute and read and write
2D1C000
stack
page read and write
28AD000
trusted library allocation
page read and write
5F2F000
stack
page read and write
400000
unkown
page readonly
7FF848EB0000
trusted library allocation
page read and write
2750000
heap
page read and write
14A7000
heap
page read and write
4CBB000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
FA0000
unkown
page readonly
1733000
heap
page read and write
21EE000
stack
page read and write
5BE000
stack
page read and write
1B8CD000
stack
page read and write
E20000
trusted library allocation
page read and write
BEA000
trusted library allocation
page execute and read and write
2670000
heap
page read and write
6960000
trusted library allocation
page read and write
E70000
trusted library allocation
page execute and read and write
4CE2000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
AF0000
heap
page read and write
3861000
trusted library allocation
page read and write
3230000
heap
page read and write
5430000
heap
page read and write
65D0000
trusted library allocation
page execute and read and write
E05000
trusted library allocation
page execute and read and write
953000
heap
page read and write
4CD1000
trusted library allocation
page read and write
4D30000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
402000
unkown
page readonly
144C000
heap
page read and write
285E000
stack
page read and write
333E000
stack
page read and write
1452000
heap
page read and write
4D10000
heap
page execute and read and write
780000
heap
page read and write
7B0000
heap
page read and write
2A9F000
stack
page read and write
13B0000
heap
page read and write
5E0000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
938000
heap
page read and write
1C51B000
stack
page read and write
647D000
trusted library allocation
page read and write
61EE000
stack
page read and write
299E000
stack
page read and write
33C6000
trusted library allocation
page read and write
19A000
stack
page read and write
141F000
heap
page read and write
1340000
heap
page read and write
982000
heap
page read and write
1C1FF000
heap
page read and write
295F000
stack
page read and write
BD0000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
401000
unkown
page execute read
BE6000
trusted library allocation
page execute and read and write
7FF848FA2000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
6480000
heap
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
1C10E000
stack
page read and write
1D0DF000
stack
page read and write
285E000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
BB0000
trusted library allocation
page read and write
1421000
heap
page read and write
FB6000
unkown
page readonly
BE2000
trusted library allocation
page read and write
271E000
stack
page read and write
6950000
trusted library allocation
page read and write
3100000
heap
page read and write
530000
heap
page read and write
6319000
trusted library allocation
page read and write
4CCA000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
7FA00000
trusted library allocation
page execute and read and write
645000
heap
page read and write
A10000
heap
page read and write
65E0000
trusted library allocation
page read and write
5C4A000
heap
page read and write
1390000
heap
page read and write
6C30000
heap
page read and write
4CDD000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
4E80000
heap
page read and write
97F000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2230000
heap
page read and write
1C1D9000
heap
page read and write
1C1D7000
heap
page read and write
3889000
trusted library allocation
page read and write
542D000
stack
page read and write
13B5000
heap
page read and write
1750000
heap
page read and write
4CD6000
trusted library allocation
page read and write
4F8C000
stack
page read and write
1CE58000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
1C85E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
21A0000
heap
page read and write
65E7000
trusted library allocation
page read and write
222E000
stack
page read and write
33A1000
trusted library allocation
page read and write
16AE000
stack
page read and write
9F8000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page read and write
1350000
heap
page read and write
62EE000
stack
page read and write
946000
heap
page read and write
281F000
stack
page read and write
1C310000
heap
page read and write
1730000
heap
page read and write
1BD05000
stack
page read and write
7E6000
heap
page read and write
1C110000
heap
page read and write
7FF474C90000
trusted library allocation
page execute and read and write
BC3000
trusted library allocation
page execute and read and write
4CBE000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
B3E000
stack
page read and write
185C000
stack
page read and write
8F9000
stack
page read and write
FA0000
unkown
page readonly
5E5000
heap
page read and write
99C000
heap
page read and write
E80000
heap
page read and write
402000
unkown
page readonly
12F1000
stack
page read and write
6490000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
5C21000
heap
page read and write
14D5000
heap
page read and write
16E0000
trusted library allocation
page read and write
1C41E000
stack
page read and write
28EA000
trusted library allocation
page read and write
9B000
stack
page read and write
401000
unkown
page execute read
189E000
unkown
page read and write
5BF0000
heap
page read and write
BCD000
trusted library allocation
page execute and read and write
64DD000
stack
page read and write
78A000
heap
page read and write
1D4DC000
stack
page read and write
1D3DA000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
918000
heap
page read and write
BC0000
trusted library allocation
page read and write
13EC000
heap
page read and write
64E0000
trusted library allocation
page read and write
13FE000
heap
page read and write
6990000
heap
page read and write
4D00000
trusted library allocation
page read and write
1C162000
heap
page read and write
141D000
heap
page read and write
1C13C000
heap
page read and write
16F3000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
400000
unkown
page readonly
1D0E0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
266C000
stack
page read and write
9F2000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
57E000
stack
page read and write
BF7000
heap
page read and write
2C1C000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page execute and read and write
4E83000
heap
page read and write
2896000
trusted library allocation
page read and write
1CC5F000
stack
page read and write
4D0000
unkown
page readonly
7FF848E1D000
trusted library allocation
page execute and read and write
2ADE000
stack
page read and write
74E000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
1B370000
trusted library allocation
page read and write
91E000
heap
page read and write
There are 238 hidden memdumps, click here to show them.