IOC Report
extracted_payload.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
extracted_payload.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_ext_cb732a877ab57dd2d946af222794a5afefd7721_f0f0aff8_253f7c32-d5c0-48d0-9464-549d84556580\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_ext_cb732a877ab57dd2d946af222794a5afefd7721_f0f0aff8_eeaad2f6-aca0-401b-9aab-2173bff9d66e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_ext_cb732a877ab57dd2d946af222794a5afefd7721_f0f0aff8_ff20ae40-2634-4b53-bc11-91db7a4c3297\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6598.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 22:02:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6616.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 22:02:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6654.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6694.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6694.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6712.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B3.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 22:02:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7102.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7123.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\extracted_payload.dll.dll,ReflectiveLoader
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extracted_payload.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extracted_payload.dll.dll",ReflectiveLoader
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\extracted_payload.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\extracted_payload.dll.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7572 -s 332
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7588 -s 352
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7852 -s 352

URLs

Name
IP
Malicious
3.78.244.11
malicious
http://upx.sf.net
unknown
http://127.0.0.1:%u/
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{ca94feb3-e9f3-c2eb-0bcb-16a628aa01fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFE0E162000
unkown
page readonly
malicious
25254020000
direct allocation
page execute and read and write
malicious
1627EFF0000
direct allocation
page execute and read and write
malicious
1A4C0FD0000
direct allocation
page execute and read and write
malicious
7FFE0E162000
unkown
page readonly
malicious
7FFE0E162000
unkown
page readonly
malicious
BC8E7BC000
stack
page read and write
2576D2B0000
heap
page read and write
C727BE000
stack
page read and write
1A4BF590000
heap
page read and write
A8771C000
stack
page read and write
8C284FF000
stack
page read and write
252525C0000
heap
page read and write
7FFE0E130000
unkown
page readonly
7FFE0E183000
unkown
page read and write
7FFE0E183000
unkown
page read and write
1627ED50000
heap
page read and write
7FFE0E184000
unkown
page readonly
BC8EA7E000
stack
page read and write
8C281FC000
stack
page read and write
1A4C1024000
direct allocation
page execute and read and write
C72A7E000
stack
page read and write
1627EFE0000
heap
page read and write
7FFE0E17E000
unkown
page read and write
25254074000
direct allocation
page execute and read and write
7FFE0E131000
unkown
page execute read
2576D31C000
heap
page read and write
252528F0000
heap
page read and write
BC8EAFE000
stack
page read and write
252528F5000
heap
page read and write
1627F044000
direct allocation
page execute and read and write
2576D510000
heap
page read and write
7FFE0E178000
unkown
page read and write
7FFE0E184000
unkown
page readonly
1627ED78000
heap
page read and write
8C285FF000
stack
page read and write
1627F0B0000
heap
page read and write
7FFE0E172000
unkown
page write copy
7FFE0E130000
unkown
page readonly
1627ED70000
heap
page read and write
7FFE0E17E000
unkown
page read and write
7FFE0E184000
unkown
page readonly
1A4BF498000
heap
page read and write
C7273C000
stack
page read and write
1A4BF490000
heap
page read and write
7FFE0E178000
unkown
page read and write
7FFE0E172000
unkown
page write copy
25252650000
heap
page read and write
1A4C1130000
heap
page read and write
7FFE0E178000
unkown
page read and write
7FFE0E172000
unkown
page write copy
1A4BF690000
heap
page read and write
1627F0B5000
heap
page read and write
2576D300000
heap
page read and write
2576D5F0000
heap
page read and write
1627EF40000
heap
page read and write
7FFE0E131000
unkown
page execute read
A8779E000
stack
page read and write
7FFE0E17E000
unkown
page read and write
2576D319000
heap
page read and write
1A4BF820000
heap
page read and write
25252658000
heap
page read and write
1A4BF670000
heap
page read and write
2576D2C0000
heap
page read and write
252525E0000
heap
page read and write
7FFE0E183000
unkown
page read and write
7FFE0E130000
unkown
page readonly
252524E0000
heap
page read and write
1A4BF825000
heap
page read and write
2525266E000
heap
page read and write
1627ED40000
heap
page read and write
A87A7F000
stack
page read and write
2576D2E0000
heap
page read and write
2525265F000
heap
page read and write
2576D30D000
heap
page read and write
2576D2E0000
heap
page read and write
25254010000
heap
page read and write
7FFE0E131000
unkown
page execute read
There are 68 hidden memdumps, click here to show them.