IOC Report
PO234400.exe

loading gif

Files

File Path
Type
Category
Malicious
PO234400.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO234400.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5m1c2nii.nam.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a05r2hnr.pls.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fp35rzaj.cbr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hdyvhbvf.dsv.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO234400.exe
C:\Users\user\Desktop\PO234400.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO234400.exe
malicious
C:\Users\user\Desktop\PO234400.exe
C:\Users\user\Desktop\PO234400.exe
malicious
C:\Users\user\Desktop\PO234400.exe
C:\Users\user\Desktop\PO234400.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://mbarieservicesltd.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://mail.mbarieservicesltd.com
unknown

Domains

Name
IP
Malicious
mbarieservicesltd.com
199.79.62.115
malicious
mail.mbarieservicesltd.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
199.79.62.115
mbarieservicesltd.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
31D1000
trusted library allocation
page read and write
malicious
322A000
trusted library allocation
page read and write
malicious
40EE000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
18D0000
trusted library allocation
page read and write
15B0000
heap
page read and write
55BB000
stack
page read and write
15C0000
trusted library allocation
page read and write
AFE000
unkown
page readonly
2F57000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
14EE000
stack
page read and write
A2FE000
stack
page read and write
1450000
heap
page read and write
6810000
heap
page read and write
56B0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
5C5F000
stack
page read and write
2EE0000
heap
page read and write
14DD000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
101A000
trusted library allocation
page execute and read and write
A62000
unkown
page readonly
5FF0000
trusted library allocation
page execute and read and write
1047000
heap
page read and write
6C9E000
stack
page read and write
129C000
stack
page read and write
5E00000
trusted library allocation
page read and write
500C000
stack
page read and write
A6FE000
stack
page read and write
F8A000
stack
page read and write
1090000
heap
page read and write
A83E000
stack
page read and write
56B6000
trusted library allocation
page read and write
3FB5000
trusted library allocation
page read and write
1016000
trusted library allocation
page execute and read and write
6010000
trusted library allocation
page read and write
722E000
stack
page read and write
2E9E000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
F50000
heap
page read and write
15B2000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
6B5C000
trusted library allocation
page read and write
75C0000
trusted library section
page read and write
A60000
unkown
page readonly
2F71000
trusted library allocation
page read and write
681E000
heap
page read and write
1012000
trusted library allocation
page read and write
759E000
stack
page read and write
58CD000
stack
page read and write
56BE000
trusted library allocation
page read and write
15F0000
heap
page read and write
51D8000
trusted library allocation
page read and write
15C7000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
102E000
heap
page read and write
1028000
heap
page read and write
1590000
trusted library allocation
page read and write
2FBC000
stack
page read and write
2EB2000
trusted library allocation
page read and write
ACCE000
stack
page read and write
1300000
heap
page read and write
6829000
heap
page read and write
1593000
trusted library allocation
page execute and read and write
147A000
heap
page read and write
400000
remote allocation
page execute and read and write
6940000
trusted library allocation
page read and write
15C2000
trusted library allocation
page read and write
12C0000
trusted library allocation
page execute and read and write
1484000
heap
page read and write
53B0000
trusted library allocation
page read and write
7F850000
trusted library allocation
page execute and read and write
15B7000
heap
page read and write
1055000
heap
page read and write
6817000
heap
page read and write
157E000
stack
page read and write
5DE0000
trusted library allocation
page read and write
15C5000
trusted library allocation
page execute and read and write
56F0000
trusted library allocation
page read and write
FFD000
trusted library allocation
page execute and read and write
11FB000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
7030000
heap
page read and write
5DF0000
trusted library allocation
page read and write
2F00000
heap
page read and write
172F000
stack
page read and write
1020000
heap
page read and write
10D9000
heap
page read and write
41D9000
trusted library allocation
page read and write
5853000
heap
page read and write
F55000
heap
page read and write
ABC2000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
56E2000
trusted library allocation
page read and write
6937000
trusted library allocation
page read and write
1550000
heap
page read and write
FE0000
trusted library allocation
page read and write
5EE0000
heap
page read and write
13EE000
stack
page read and write
11F7000
trusted library allocation
page execute and read and write
42C000
remote allocation
page execute and read and write
7330000
trusted library allocation
page read and write
12F9000
stack
page read and write
3238000
trusted library allocation
page read and write
5A5F000
stack
page read and write
55D0000
trusted library section
page readonly
7732000
trusted library allocation
page read and write
15AD000
trusted library allocation
page execute and read and write
6B50000
trusted library allocation
page read and write
6B68000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
15BA000
trusted library allocation
page execute and read and write
5FEE000
stack
page read and write
F9E000
stack
page read and write
7236000
heap
page read and write
55C0000
heap
page execute and read and write
2F3E000
stack
page read and write
3F19000
trusted library allocation
page read and write
8B37000
trusted library allocation
page read and write
F10000
heap
page read and write
5EB0000
heap
page read and write
1010000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
6990000
heap
page read and write
A33E000
stack
page read and write
1590000
trusted library allocation
page read and write
6B6B000
trusted library allocation
page read and write
5850000
heap
page read and write
15A0000
trusted library allocation
page read and write
7254000
heap
page read and write
15E0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
6B84000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
A97E000
stack
page read and write
2E5F000
stack
page read and write
6985000
trusted library allocation
page read and write
2FC0000
heap
page execute and read and write
6C50000
heap
page read and write
30CE000
stack
page read and write
A6BF000
stack
page read and write
2EE3000
heap
page read and write
5740000
trusted library allocation
page execute and read and write
B9A000
stack
page read and write
584D000
stack
page read and write
2F11000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
A100000
heap
page read and write
5392000
trusted library allocation
page read and write
7262000
heap
page read and write
18D4000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
6020000
heap
page read and write
A93F000
stack
page read and write
152E000
stack
page read and write
580E000
stack
page read and write
8DBF000
stack
page read and write
2E80000
trusted library allocation
page read and write
57AE000
stack
page read and write
2EA1000
trusted library allocation
page read and write
56CA000
trusted library allocation
page read and write
57C0000
heap
page read and write
15A0000
trusted library allocation
page read and write
3F67000
trusted library allocation
page read and write
18E0000
heap
page read and write
41D1000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
7230000
heap
page read and write
6980000
trusted library allocation
page read and write
574C000
stack
page read and write
723B000
heap
page read and write
56CE000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
AABB000
stack
page read and write
F00000
heap
page read and write
595C000
stack
page read and write
1458000
heap
page read and write
125E000
stack
page read and write
1600000
trusted library allocation
page execute and read and write
159D000
trusted library allocation
page execute and read and write
15CB000
trusted library allocation
page execute and read and write
105F000
heap
page read and write
5710000
heap
page read and write
14EF000
heap
page read and write
1594000
trusted library allocation
page read and write
A5BE000
stack
page read and write
FE5000
heap
page read and write
70FE000
stack
page read and write
A43E000
stack
page read and write
151F000
heap
page read and write
1486000
heap
page read and write
5B5F000
stack
page read and write
56DD000
trusted library allocation
page read and write
69A0000
trusted library allocation
page execute and read and write
5660000
heap
page read and write
14D9000
heap
page read and write
103F000
heap
page read and write
2E8B000
trusted library allocation
page read and write
6C3D000
stack
page read and write
6B70000
trusted library allocation
page execute and read and write
11F0000
trusted library allocation
page read and write
141E000
stack
page read and write
6910000
trusted library allocation
page execute and read and write
AA7F000
stack
page read and write
5380000
heap
page read and write
6CDE000
stack
page read and write
1530000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
A7FF000
stack
page read and write
15B6000
trusted library allocation
page execute and read and write
56C2000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
3F11000
trusted library allocation
page read and write
ABBC000
stack
page read and write
ABC0000
trusted library allocation
page read and write
6B66000
trusted library allocation
page read and write
1062000
heap
page read and write
2F7C000
trusted library allocation
page read and write
6025000
heap
page read and write
1580000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
2E84000
trusted library allocation
page read and write
FF3000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
57C0000
heap
page execute and read and write
7B10000
trusted library allocation
page execute and read and write
5EC0000
heap
page read and write
58E0000
trusted library section
page read and write
12A0000
heap
page read and write
FE0000
heap
page read and write
12E0000
heap
page read and write
FDE000
stack
page read and write
2EC0000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
4003000
trusted library allocation
page read and write
1420000
heap
page read and write
14C9000
heap
page read and write
12D0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
FF4000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
536D000
stack
page read and write
2EAD000
trusted library allocation
page read and write
6000000
trusted library section
page read and write
There are 238 hidden memdumps, click here to show them.