IOC Report
Arrival_Notice.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
Arrival_Notice.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Arrival_Notice.bat.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA612.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\mjiCFnur.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\mjiCFnur.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mjiCFnur.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15usn100.210.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2pq32cui.eh0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4t5eliis.4jm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c3eufo0x.qul.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmizh345.esh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xydign3g.1gh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytrxx1lh.ffp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuasz5rf.g5z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD06D.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Arrival_Notice.bat.exe
"C:\Users\user\Desktop\Arrival_Notice.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Arrival_Notice.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mjiCFnur.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mjiCFnur" /XML "C:\Users\user\AppData\Local\Temp\tmpA612.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\mjiCFnur.exe
C:\Users\user\AppData\Roaming\mjiCFnur.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mjiCFnur" /XML "C:\Users\user\AppData\Local\Temp\tmpD06D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2B06000
trusted library allocation
page read and write
malicious
E70000
direct allocation
page read and write
malicious
5590000
trusted library section
page read and write
malicious
296D000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A77000
trusted library allocation
page execute and read and write
CD2000
trusted library allocation
page read and write
6E0E000
stack
page read and write
6F39000
heap
page read and write
4E60000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
5000000
heap
page read and write
B54000
trusted library allocation
page read and write
3967000
trusted library allocation
page read and write
F47000
heap
page read and write
B00000
heap
page read and write
D17000
heap
page read and write
4F52000
trusted library allocation
page read and write
850E000
stack
page read and write
1288000
direct allocation
page execute and read and write
120D000
direct allocation
page execute and read and write
CB4000
trusted library allocation
page read and write
5300000
trusted library allocation
page execute and read and write
704AD000
unkown
page read and write
4FAB000
stack
page read and write
D00000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
4F40000
trusted library allocation
page execute and read and write
1A49000
direct allocation
page execute and read and write
B4DF000
stack
page read and write
1946000
direct allocation
page execute and read and write
CBD000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
843D000
stack
page read and write
15B0000
heap
page read and write
4E6B000
trusted library allocation
page read and write
AF7000
stack
page read and write
A43000
trusted library allocation
page execute and read and write
6B1C000
trusted library allocation
page read and write
4E70000
heap
page read and write
B5E000
stack
page read and write
4988000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
24C0000
heap
page read and write
4F50000
trusted library allocation
page read and write
5030000
trusted library allocation
page execute and read and write
3A86000
trusted library allocation
page read and write
D40000
heap
page read and write
D75000
heap
page read and write
CD6000
trusted library allocation
page execute and read and write
704AD000
unkown
page read and write
4E30000
trusted library allocation
page read and write
C9D000
stack
page read and write
1500000
heap
page read and write
A44000
trusted library allocation
page read and write
291F000
stack
page read and write
5360000
heap
page read and write
B96C000
stack
page read and write
4E86000
trusted library allocation
page read and write
868D000
stack
page read and write
B30000
trusted library allocation
page execute and read and write
A6A000
trusted library allocation
page execute and read and write
4E60000
heap
page read and write
8690000
heap
page read and write
12FD000
stack
page read and write
D67000
heap
page read and write
6A4E000
stack
page read and write
6EE8000
heap
page read and write
4ED0000
trusted library allocation
page read and write
FE0000
heap
page read and write
41A000
stack
page read and write
18AF000
stack
page read and write
B12E000
stack
page read and write
E3D000
heap
page read and write
1206000
direct allocation
page execute and read and write
5320000
trusted library allocation
page read and write
B0BD000
stack
page read and write
5070000
trusted library section
page readonly
4E81000
trusted library allocation
page read and write
A72000
trusted library allocation
page read and write
25E0000
heap
page read and write
290A000
stack
page read and write
CE2000
trusted library allocation
page read and write
D48000
heap
page read and write
8F7000
stack
page read and write
E0D000
heap
page read and write
888F000
stack
page read and write
3B24000
trusted library allocation
page read and write
19A6000
direct allocation
page execute and read and write
D83000
heap
page read and write
18B0000
direct allocation
page read and write
5380000
heap
page read and write
2D2E000
stack
page read and write
53B0000
trusted library allocation
page execute and read and write
5080000
heap
page read and write
29CD000
trusted library allocation
page read and write
19E2000
direct allocation
page execute and read and write
A66000
trusted library allocation
page execute and read and write
78A000
stack
page read and write
7E0000
heap
page read and write
5365000
heap
page read and write
E15000
heap
page read and write
B2F0000
heap
page read and write
69E0000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
29B0000
heap
page read and write
147E000
stack
page read and write
DEB000
heap
page read and write
50F0000
heap
page execute and read and write
55B0000
trusted library allocation
page read and write
6DCE000
stack
page read and write
26E0000
trusted library allocation
page read and write
7F3E0000
trusted library allocation
page execute and read and write
E01000
heap
page read and write
6C70000
trusted library allocation
page execute and read and write
2D6B000
heap
page read and write
70490000
unkown
page readonly
B84F000
stack
page read and write
D2E000
stack
page read and write
6EBE000
stack
page read and write
8448000
heap
page read and write
2600000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
B0C0000
heap
page read and write
DD3000
heap
page read and write
4FB0000
heap
page read and write
B60E000
stack
page read and write
26C0000
heap
page read and write
281E000
stack
page read and write
9D5000
heap
page read and write
4F5C000
trusted library allocation
page read and write
9C0000
heap
page read and write
B0A0000
trusted library allocation
page execute and read and write
262B000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
B9F000
heap
page read and write
5110000
heap
page read and write
BFE000
heap
page read and write
B86000
heap
page read and write
B93000
heap
page read and write
3981000
trusted library allocation
page read and write
14B8000
heap
page read and write
CD0000
trusted library allocation
page read and write
B6A000
heap
page read and write
6B17000
trusted library allocation
page read and write
C12000
heap
page read and write
26EC000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
D4E000
heap
page read and write
4F30000
heap
page read and write
88D000
stack
page read and write
F2C000
stack
page read and write
5340000
trusted library allocation
page execute and read and write
28BB000
heap
page read and write
B0ED000
stack
page read and write
4E10000
trusted library allocation
page execute and read and write
84B0000
trusted library allocation
page read and write
5090000
heap
page read and write
26D0000
trusted library allocation
page execute and read and write
704F000
stack
page read and write
D30000
heap
page execute and read and write
29FF000
unkown
page read and write
9F0000
heap
page read and write
2641000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
103E000
stack
page read and write
4EA0000
trusted library allocation
page read and write
D81000
heap
page read and write
4A1C000
stack
page read and write
291E000
stack
page read and write
6B7E000
heap
page read and write
281F000
stack
page read and write
2620000
trusted library allocation
page read and write
25DE000
unkown
page read and write
2960000
trusted library allocation
page read and write
B6DE000
stack
page read and write
283F000
unkown
page read and write
50E0000
heap
page read and write
715E000
stack
page read and write
50F5000
heap
page read and write
50DB000
stack
page read and write
B3BE000
stack
page read and write
54A000
stack
page read and write
D10000
heap
page read and write
B2DD000
stack
page read and write
704A6000
unkown
page readonly
5FE000
stack
page read and write
5003000
heap
page read and write
1BD1000
direct allocation
page execute and read and write
3C30000
trusted library allocation
page read and write
6C80000
trusted library allocation
page execute and read and write
7160000
trusted library allocation
page read and write
837E000
stack
page read and write
AEE000
stack
page read and write
F40000
heap
page read and write
6B5E000
stack
page read and write
4E73000
heap
page read and write
B70E000
stack
page read and write
1D00000
heap
page read and write
DB7000
heap
page read and write
CC3000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
9F0000
heap
page read and write
264D000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
BBAD000
stack
page read and write
A62000
trusted library allocation
page read and write
842B000
heap
page read and write
CC0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page execute and read and write
26E2000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
CEB000
trusted library allocation
page execute and read and write
B56000
trusted library allocation
page read and write
1A43000
direct allocation
page execute and read and write
5A0000
heap
page read and write
B6E000
heap
page read and write
B74E000
stack
page read and write
2568000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
FD0000
heap
page read and write
B2E000
stack
page read and write
CCD000
trusted library allocation
page execute and read and write
F30000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
CB3000
trusted library allocation
page execute and read and write
2F40000
heap
page read and write
1920000
direct allocation
page execute and read and write
B86C000
stack
page read and write
19A0000
direct allocation
page execute and read and write
4B1C000
stack
page read and write
DFD000
heap
page read and write
4E8D000
trusted library allocation
page read and write
6B70000
heap
page read and write
4FC0000
heap
page execute and read and write
AEBE000
stack
page read and write
3DD000
stack
page read and write
106D000
direct allocation
page execute and read and write
5370000
heap
page read and write
8910000
trusted library section
page read and write
2CD0000
heap
page read and write
18DB000
direct allocation
page read and write
1BE6000
direct allocation
page execute and read and write
6EF8000
heap
page read and write
CE7000
trusted library allocation
page execute and read and write
50F0000
heap
page read and write
4E7E000
trusted library allocation
page read and write
711C000
trusted library allocation
page read and write
6B0D000
trusted library allocation
page read and write
50CD000
stack
page read and write
3947000
trusted library allocation
page read and write
8A9E000
stack
page read and write
B970000
heap
page read and write
3921000
trusted library allocation
page read and write
1BED000
direct allocation
page execute and read and write
7F440000
trusted library allocation
page execute and read and write
A80000
heap
page read and write
69F0000
trusted library allocation
page execute and read and write
7110000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
2710000
heap
page execute and read and write
E3B000
heap
page read and write
11F1000
direct allocation
page execute and read and write
704AF000
unkown
page readonly
25F0000
heap
page read and write
5040000
trusted library allocation
page read and write
29FF000
stack
page read and write
5B0000
heap
page read and write
5100000
heap
page read and write
B10000
heap
page read and write
8423000
heap
page read and write
B5DE000
stack
page read and write
F6D000
stack
page read and write
3B1B000
trusted library allocation
page read and write
5280000
heap
page read and write
F3E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
BA2000
heap
page read and write
3929000
trusted library allocation
page read and write
E2F000
stack
page read and write
28CD000
stack
page read and write
1069000
direct allocation
page execute and read and write
52EE000
stack
page read and write
6B00000
trusted library allocation
page read and write
2970000
heap
page read and write
6F4E000
stack
page read and write
6F22000
heap
page read and write
860F000
stack
page read and write
39FB000
trusted library allocation
page read and write
A5D000
trusted library allocation
page execute and read and write
8490000
trusted library allocation
page execute and read and write
2CE0000
heap
page read and write
3BEC000
trusted library allocation
page read and write
B4CC000
stack
page read and write
6F56000
heap
page read and write
13F0000
heap
page read and write
4EC0000
trusted library allocation
page read and write
2D60000
heap
page read and write
2970000
heap
page read and write
9D0000
heap
page read and write
6ACE000
stack
page read and write
39C7000
trusted library allocation
page read and write
B5CC000
stack
page read and write
B80000
heap
page read and write
26F0000
trusted library allocation
page read and write
6CCE000
stack
page read and write
B2E0000
heap
page read and write
F40000
direct allocation
page execute and read and write
6A00000
trusted library allocation
page execute and read and write
2610000
heap
page read and write
86B0000
trusted library allocation
page read and write
6A8E000
stack
page read and write
3AC3000
trusted library allocation
page read and write
6C5E000
stack
page read and write
287E000
stack
page read and write
864D000
stack
page read and write
B40000
trusted library allocation
page read and write
2605000
trusted library allocation
page read and write
83D0000
heap
page read and write
847E000
stack
page read and write
D5F000
stack
page read and write
98C000
stack
page read and write
B50000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
E6E000
stack
page read and write
4490000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
B60000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page read and write
630000
unkown
page readonly
6EE0000
heap
page read and write
B2BE000
stack
page read and write
2700000
heap
page read and write
3989000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
28B0000
heap
page read and write
6E7E000
stack
page read and write
2646000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
10DE000
direct allocation
page execute and read and write
6F0000
unkown
page readonly
4E50000
trusted library section
page readonly
2660000
trusted library allocation
page read and write
A53000
trusted library allocation
page read and write
29BE000
unkown
page read and write
7F0000
heap
page read and write
4EB0000
trusted library allocation
page read and write
263E000
trusted library allocation
page read and write
6F0E000
stack
page read and write
17AF000
stack
page read and write
BE0000
heap
page read and write
143E000
stack
page read and write
295B000
stack
page read and write
2E9F000
stack
page read and write
9F8000
heap
page read and write
14B0000
heap
page read and write
138F000
stack
page read and write
2981000
trusted library allocation
page read and write
632000
unkown
page readonly
1927000
direct allocation
page execute and read and write
BCAE000
stack
page read and write
6D7E000
stack
page read and write
D20000
trusted library allocation
page execute and read and write
5010000
trusted library allocation
page read and write
CDA000
trusted library allocation
page execute and read and write
70491000
unkown
page execute read
6EF0000
heap
page read and write
There are 362 hidden memdumps, click here to show them.