IOC Report
Payment_Advice.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment_Advice.pdf.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp8A6E.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\FGZscboXVnu.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Payment_Advice.pdf.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fodqf20.cem.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3f35qw1c.3wc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ct1uva0p.ri5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fyaik0a5.dpc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrwid0na.3qb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p0qyczo0.0fa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfuk5y4j.u5p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrusci0x.z0w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\FGZscboXVnu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment_Advice.pdf.exe
"C:\Users\user\Desktop\Payment_Advice.pdf.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Advice.pdf.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FGZscboXVnu.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FGZscboXVnu" /XML "C:\Users\user\AppData\Local\Temp\tmp8A6E.tmp"
malicious
C:\Users\user\Desktop\Payment_Advice.pdf.exe
C:\Users\user\Desktop\Payment_Advice.pdf.exe
malicious
C:\Users\user\AppData\Roaming\FGZscboXVnu.exe
C:\Users\user\AppData\Roaming\FGZscboXVnu.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7304 -s 12
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
https://sempersim.su/c17/fre.php
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibsensoftware.com/
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://go.microsoft.c
unknown
http://go.microsoft.ctain
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 24 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
314F000
trusted library allocation
page read and write
malicious
131AB000
trusted library allocation
page read and write
malicious
131C5000
trusted library allocation
page read and write
malicious
A50000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1085000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
131DF000
trusted library allocation
page read and write
B00000
heap
page read and write
D00000
heap
page read and write
1E9A4000
heap
page read and write
1E994000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
13501000
trusted library allocation
page read and write
D2000
unkown
page readonly
3178000
trusted library allocation
page read and write
853000
heap
page read and write
4E0000
heap
page read and write
1BE80000
heap
page read and write
7FFD9B788000
trusted library allocation
page read and write
12FB8000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
3006000
trusted library allocation
page read and write
D10000
trusted library section
page readonly
7FFD9B770000
trusted library allocation
page read and write
2FB0000
heap
page read and write
1B83C000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
1E992000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
DFE000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3073000
heap
page read and write
DD3000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1D32E000
stack
page read and write
27100B90000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
E56000
heap
page read and write
27100D50000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FF4EE100000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1AFE0000
trusted library allocation
page read and write
1C060000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1337C000
trusted library allocation
page read and write
1C46C000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1BCE3000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1E430000
heap
page read and write
1030000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1C09B000
heap
page read and write
2FAE000
stack
page read and write
136EB000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
27100C70000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1C140000
heap
page execute and read and write
81D000
heap
page read and write
87A000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
1040000
trusted library section
page read and write
DD0000
heap
page read and write
DBB000
heap
page read and write
12FC1000
trusted library allocation
page read and write
D90000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1CF2E000
stack
page read and write
7F3000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
1C030000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
1D06E000
stack
page read and write
CD0000
heap
page read and write
34EE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
1E4AC000
heap
page read and write
2297D000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B912000
trusted library allocation
page read and write
F59D969000
stack
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
C50000
trusted library allocation
page read and write
886000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
13809000
trusted library allocation
page read and write
1C72D000
stack
page read and write
1BE70000
heap
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
27100D58000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
5E0000
heap
page read and write
30E0000
heap
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
1C86F000
stack
page read and write
22D7E000
stack
page read and write
1ED8B000
stack
page read and write
1F26B000
stack
page read and write
27100C90000
heap
page read and write
27100D25000
heap
page read and write
850000
heap
page read and write
1E0000
heap
page read and write
D05000
heap
page read and write
7FFD9B936000
trusted library allocation
page read and write
5C0000
heap
page read and write
13864000
trusted library allocation
page read and write
1080000
heap
page read and write
8FE000
heap
page read and write
134F1000
trusted library allocation
page read and write
1C010000
trusted library section
page read and write
2BA0000
heap
page read and write
1BCE0000
heap
page read and write
1BCB0000
heap
page read and write
2317B000
stack
page read and write
87C000
heap
page read and write
1BB80000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C00E000
heap
page read and write
F59D9EE000
unkown
page read and write
7FFD9B943000
trusted library allocation
page read and write
1BBB0000
heap
page read and write
1CB2E000
stack
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1BCA0000
trusted library section
page readonly
3070000
heap
page read and write
1C230000
heap
page read and write
D96000
heap
page read and write
B05000
heap
page read and write
13601000
trusted library allocation
page read and write
BF3000
stack
page read and write
1BBC8000
heap
page read and write
AF5000
heap
page read and write
E5C000
heap
page read and write
7FFD9B94C000
trusted library allocation
page read and write
1D330000
heap
page read and write
138BF000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
130E000
stack
page read and write
7FFD9B90B000
trusted library allocation
page read and write
1CC6E000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
F59DC7F000
stack
page read and write
838000
heap
page read and write
34F1000
trusted library allocation
page read and write
9E0000
heap
page read and write
1374D000
trusted library allocation
page read and write
1D340000
heap
page read and write
1BFB0000
heap
page read and write
1EA4A000
heap
page read and write
1BBCE000
heap
page read and write
137AD000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
D9C000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
AF0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
12FB1000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page read and write
1E5D0000
trusted library section
page read and write
7FFD9B760000
trusted library allocation
page read and write
1EE6D000
stack
page read and write
810000
heap
page read and write
D20000
heap
page read and write
1BE50000
heap
page read and write
134F8000
trusted library allocation
page read and write
816000
heap
page read and write
11FC000
stack
page read and write
1BBCA000
heap
page read and write
1E070000
trusted library allocation
page read and write
1BBA0000
heap
page read and write
3E5A000
trusted library allocation
page read and write
1E092000
trusted library allocation
page read and write
1326C000
trusted library allocation
page read and write
1E970000
heap
page read and write
C70000
trusted library allocation
page read and write
1E9B2000
heap
page read and write
1C066000
heap
page read and write
A00000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2EA7000
heap
page read and write
A20000
heap
page read and write
F0E000
stack
page read and write
1B520000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1BBF8000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1F66E000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
1C020000
trusted library section
page read and write
A80000
heap
page execute and read and write
C00000
heap
page read and write
E02000
heap
page read and write
27100D20000
heap
page read and write
C83000
trusted library allocation
page read and write
DAF000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
3046000
heap
page read and write
3040000
heap
page read and write
D14000
trusted library section
page readonly
1BC6D000
stack
page read and write
1EA34000
heap
page read and write
1BFF0000
trusted library section
page read and write
1E627000
trusted library section
page read and write
130C1000
trusted library allocation
page read and write
1E98F000
heap
page read and write
D0000
unkown
page readonly
7FFD9B764000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B91B000
trusted library allocation
page read and write
E1A000
heap
page read and write
21D80000
trusted library allocation
page read and write
There are 215 hidden memdumps, click here to show them.