IOC Report
RFQ-SulselBarruII2-COALCOMMLDOC.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ-SulselBarruII2-COALCOMMLDOC.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\RFQ-SulselBarruII2-COALCOMMLDOC.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Unmeringued.Brd
ASCII text, with very long lines (61450), with no line terminators
dropped
malicious
C:\Program Files (x86)\Common Files\ukases.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nsjlhnjp.qwc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qr5yvafi.dw1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Behandlingsmaal.sac
data
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Kliniklokalernes.sun
data
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Potatory.rea
FoxPro FPT, blocks size 16640, next free block index 173, field type 0
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\RFQ-SulselBarruII2-COALCOMMLDOC.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Reluktansernes.Ove71
data
dropped
C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\teda.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-SulselBarruII2-COALCOMMLDOC.exe
"C:\Users\user\Desktop\RFQ-SulselBarruII2-COALCOMMLDOC.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Harish116=Get-Content 'C:\Users\user\AppData\Local\Ubarberet\Graustark\resultalet\Unmeringued.Brd';$Omkldningsrums=$Harish116.SubString(61425,3);.$Omkldningsrums($Harish116)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ebnsina.top/project/five/fre.php
104.21.13.124
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com/
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ebnsina.top
104.21.13.124
malicious
drive.google.com
192.178.50.78
drive.usercontent.google.com
192.178.50.65

IPs

IP
Domain
Country
Malicious
104.21.13.124
ebnsina.top
United States
malicious
192.178.50.78
drive.google.com
United States
192.178.50.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\goplernes\Uncavernously232
tchaikovsky
HKEY_CURRENT_USER\SOFTWARE\wegotism
afskedstaltes
HKEY_CURRENT_USER\SOFTWARE\zachary
xoana

Memdumps

Base Address
Regiontype
Protect
Malicious
3E01000
heap
page read and write
malicious
8EBA000
direct allocation
page execute and read and write
malicious
73E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1F5CC000
stack
page read and write
578F000
stack
page read and write
5BE000
stack
page read and write
5680000
direct allocation
page read and write
462000
unkown
page readonly
5690000
direct allocation
page read and write
8475000
heap
page read and write
4FF4000
trusted library allocation
page read and write
752000
heap
page read and write
6D20000
direct allocation
page read and write
57F0000
heap
page read and write
775000
heap
page read and write
2D2F000
heap
page read and write
728000
heap
page read and write
752000
heap
page read and write
2F4000
unkown
page readonly
75B0000
trusted library allocation
page read and write
775000
heap
page read and write
2CC3000
heap
page read and write
2C88000
heap
page read and write
313F000
stack
page read and write
3E45000
heap
page read and write
2E7F000
stack
page read and write
75E000
heap
page read and write
8100000
trusted library allocation
page read and write
2C50000
trusted library section
page read and write
277D000
stack
page read and write
2DA5000
trusted library allocation
page execute and read and write
3E06000
heap
page read and write
2C80000
heap
page read and write
6D00000
direct allocation
page read and write
8630000
trusted library allocation
page read and write
232D0000
direct allocation
page read and write
77C000
heap
page read and write
3E4E000
heap
page read and write
3D98000
heap
page read and write
57CE000
stack
page read and write
3242000
heap
page read and write
2EA8000
heap
page read and write
1F2CD000
stack
page read and write
7221000
heap
page read and write
710000
heap
page read and write
3E47000
heap
page read and write
8120000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
1F36E000
stack
page read and write
2EA0000
heap
page read and write
1F4C0000
remote allocation
page read and write
7280000
heap
page execute and read and write
8410000
heap
page read and write
23E0000
heap
page read and write
8110000
trusted library allocation
page read and write
8180000
trusted library allocation
page execute and read and write
2837000
heap
page read and write
7290000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
75E000
heap
page read and write
8690000
direct allocation
page read and write
6D40000
direct allocation
page read and write
768000
heap
page read and write
2D90000
trusted library allocation
page read and write
990000
heap
page read and write
6CE0000
direct allocation
page read and write
2838000
heap
page read and write
8620000
direct allocation
page execute and read and write
5A99000
trusted library allocation
page read and write
300A000
remote allocation
page execute and read and write
764000
heap
page read and write
8D90000
direct allocation
page execute and read and write
3DEF000
heap
page read and write
8680000
direct allocation
page read and write
6E9D000
stack
page read and write
1F660000
heap
page read and write
3E45000
heap
page read and write
7277000
trusted library allocation
page read and write
4A60000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
8480000
heap
page read and write
6B2E000
stack
page read and write
5640000
direct allocation
page read and write
2C20000
heap
page read and write
768000
heap
page read and write
AB0000
heap
page read and write
1F60E000
stack
page read and write
7199000
heap
page read and write
2A4E000
unkown
page read and write
2DE0000
trusted library allocation
page execute and read and write
708E000
stack
page read and write
2EE0000
remote allocation
page execute and read and write
1F670000
heap
page read and write
6D30000
direct allocation
page read and write
83F2000
heap
page read and write
8010000
trusted library allocation
page read and write
3E41000
heap
page read and write
764000
heap
page read and write
7420000
trusted library allocation
page read and write
768000
heap
page read and write
710E000
stack
page read and write
A30000
heap
page read and write
73D0000
trusted library allocation
page read and write
3D90000
heap
page read and write
2DC0000
trusted library allocation
page read and write
7160000
heap
page read and write
56B0000
direct allocation
page read and write
82AE000
stack
page read and write
7400000
trusted library allocation
page read and write
98E000
stack
page read and write
1F3AF000
stack
page read and write
2C17000
heap
page read and write
40A000
unkown
page read and write
269D000
stack
page read and write
7560000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2DD0000
heap
page readonly
A34000
heap
page read and write
1F28E000
stack
page read and write
2B60000
heap
page read and write
27F0000
heap
page read and write
8660000
direct allocation
page read and write
3C15000
heap
page read and write
71A9000
heap
page read and write
752000
heap
page read and write
2B0E000
stack
page read and write
3E4E000
heap
page read and write
7600000
trusted library allocation
page read and write
235F000
stack
page read and write
408000
unkown
page readonly
764000
heap
page read and write
3A0A000
remote allocation
page execute and read and write
80D0000
trusted library allocation
page execute and read and write
77B000
heap
page read and write
3E03000
heap
page read and write
19A000
stack
page read and write
5650000
direct allocation
page read and write
1F41D000
stack
page read and write
7FF0000
trusted library allocation
page execute and read and write
2D7E000
stack
page read and write
3E06000
heap
page read and write
2D9A000
trusted library allocation
page execute and read and write
1F30C000
stack
page read and write
56F0000
direct allocation
page read and write
2C7D000
trusted library allocation
page execute and read and write
2380000
heap
page read and write
4A0000
heap
page read and write
2CB9000
heap
page read and write
98000
stack
page read and write
85F0000
trusted library allocation
page read and write
753D000
stack
page read and write
80C0000
heap
page read and write
6F50000
heap
page read and write
768000
heap
page read and write
3E06000
heap
page read and write
70CE000
stack
page read and write
408000
unkown
page readonly
6AEE000
stack
page read and write
2C70000
trusted library allocation
page read and write
3E41000
heap
page read and write
3C10000
heap
page read and write
1F45E000
stack
page read and write
7570000
trusted library allocation
page read and write
2830000
heap
page read and write
3240000
heap
page read and write
6CF0000
direct allocation
page read and write
2D07000
heap
page read and write
1F3C0000
heap
page read and write
2E7E000
stack
page read and write
5C1A000
trusted library allocation
page read and write
752000
heap
page read and write
6B40000
heap
page execute and read and write
3DDC000
heap
page read and write
2C74000
trusted library allocation
page read and write
2B66000
heap
page read and write
8000000
trusted library allocation
page read and write
605000
heap
page read and write
7207000
heap
page read and write
1F53F000
stack
page read and write
8610000
trusted library allocation
page execute and read and write
1F64F000
stack
page read and write
4FFA000
trusted library allocation
page read and write
40A000
unkown
page write copy
6EDD000
stack
page read and write
2E88000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
71C6000
heap
page read and write
2CBB000
heap
page read and write
768000
heap
page read and write
2390000
heap
page read and write
71C1000
heap
page read and write
7F590000
trusted library allocation
page execute and read and write
77E000
heap
page read and write
752000
heap
page read and write
752000
heap
page read and write
6B8E000
stack
page read and write
714F000
stack
page read and write
72A0000
trusted library allocation
page execute and read and write
83F0000
heap
page read and write
2778000
stack
page read and write
2F50000
heap
page read and write
4A0E000
stack
page read and write
720000
heap
page read and write
2A7B000
heap
page read and write
775000
heap
page read and write
472000
unkown
page readonly
3E45000
heap
page read and write
2C10000
heap
page read and write
7270000
trusted library allocation
page read and write
3230000
heap
page read and write
7590000
trusted library allocation
page read and write
460000
unkown
page read and write
AAE000
stack
page read and write
3E01000
heap
page read and write
80BE000
stack
page read and write
7FE0000
heap
page read and write
3E45000
heap
page read and write
472000
unkown
page readonly
433000
unkown
page read and write
4A71000
trusted library allocation
page read and write
273C000
stack
page read and write
75C0000
trusted library allocation
page read and write
5630000
heap
page readonly
2839000
heap
page read and write
75E000
heap
page read and write
775000
heap
page read and write
84CA000
heap
page read and write
764B000
stack
page read and write
7FD7000
stack
page read and write
2A00000
heap
page read and write
775000
heap
page read and write
2E35000
direct allocation
page read and write
2B4F000
stack
page read and write
764000
heap
page read and write
2A70000
heap
page read and write
80E0000
heap
page read and write
282F000
stack
page read and write
56A0000
direct allocation
page read and write
2DA0000
trusted library allocation
page read and write
279D000
stack
page read and write
75D0000
trusted library allocation
page read and write
83EC000
stack
page read and write
764000
heap
page read and write
718A000
heap
page read and write
3DD5000
heap
page read and write
56D0000
direct allocation
page read and write
5C20000
trusted library allocation
page read and write
764000
heap
page read and write
427000
unkown
page read and write
2C40000
trusted library section
page read and write
283A000
heap
page read and write
764000
heap
page read and write
768000
heap
page read and write
768000
heap
page read and write
2D50000
heap
page read and write
3BE0000
heap
page read and write
6C0E000
stack
page read and write
8170000
trusted library allocation
page read and write
2F0000
unkown
page readonly
74BE000
stack
page read and write
42A000
unkown
page read and write
5670000
direct allocation
page read and write
5A71000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
8670000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
401000
unkown
page execute read
7580000
trusted library allocation
page read and write
82ED000
stack
page read and write
6AAE000
stack
page read and write
75E000
heap
page read and write
AB5000
heap
page read and write
2D3F000
unkown
page read and write
400000
unkown
page readonly
75E000
heap
page read and write
600000
heap
page read and write
1F4FE000
stack
page read and write
836C000
stack
page read and write
8600000
heap
page read and write
49CC000
stack
page read and write
2BEE000
stack
page read and write
2C60000
trusted library allocation
page read and write
6BCE000
stack
page read and write
5FE000
stack
page read and write
3B50000
heap
page read and write
2F1000
unkown
page execute read
75F0000
trusted library allocation
page read and write
400000
unkown
page readonly
5660000
direct allocation
page read and write
56C0000
direct allocation
page read and write
75A0000
trusted library allocation
page read and write
6D10000
direct allocation
page read and write
56E0000
direct allocation
page read and write
2E3E000
stack
page read and write
775000
heap
page read and write
83AE000
stack
page read and write
747E000
stack
page read and write
2E30000
direct allocation
page read and write
8477000
heap
page read and write
775000
heap
page read and write
1F58C000
stack
page read and write
2BAE000
stack
page read and write
4BC6000
trusted library allocation
page read and write
4FF2000
trusted library allocation
page read and write
8640000
direct allocation
page read and write
443000
unkown
page read and write
2A50000
heap
page read and write
807D000
stack
page read and write
7228000
heap
page read and write
1F4C0000
remote allocation
page read and write
98BA000
direct allocation
page execute and read and write
91F000
stack
page read and write
283D000
heap
page read and write
8265000
trusted library allocation
page read and write
462000
unkown
page readonly
7410000
trusted library allocation
page read and write
4A69000
heap
page read and write
72C2000
heap
page read and write
6B45000
heap
page execute and read and write
832C000
stack
page read and write
1F4C0000
remote allocation
page read and write
71D2000
heap
page read and write
5C07000
trusted library allocation
page read and write
2D4B000
heap
page read and write
283A000
heap
page read and write
9EE000
stack
page read and write
2A60000
heap
page read and write
2DF0000
heap
page execute and read and write
2F40000
heap
page read and write
77E000
heap
page read and write
2D64000
heap
page read and write
74FE000
stack
page read and write
2DA2000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
2B50000
heap
page read and write
70F000
stack
page read and write
574E000
stack
page read and write
401000
unkown
page execute read
2E30000
direct allocation
page read and write
2C73000
trusted library allocation
page execute and read and write
4AD2000
trusted library allocation
page read and write
8650000
direct allocation
page read and write
6D50000
direct allocation
page read and write
There are 336 hidden memdumps, click here to show them.