IOC Report
Document for shipping.exe

loading gif

Files

File Path
Type
Category
Malicious
Document for shipping.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Document for shi_1e66adbaabbf5113cadc695eb21a9b827719b085_a5a929e4_dc820042-fdf7-4e79-be5a-b9c3276b8ecf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER52C7.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 04:28:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53B2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53E2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Document for shipping.exe
"C:\Users\user\Desktop\Document for shipping.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7148 -s 1180

URLs

Name
IP
Malicious
http://foo/bar/mainwindow.baml
unknown
http://foo/bar/mainwindow.bamld
unknown
http://upx.sf.net
unknown
http://defaultcontainer/MainWindow.xamld
unknown
http://foo/MainWindow.xaml
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
ProgramId
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
FileId
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
LowerCaseLongPath
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
LongPathHash
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Name
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
OriginalFileName
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Publisher
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Version
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
BinFileVersion
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
BinaryType
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
ProductName
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
ProductVersion
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
LinkDate
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
BinProductVersion
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
AppxPackageFullName
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
AppxPackageRelativeId
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Size
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Language
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00DA5911BCE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
134000
unkown
page readonly
4F6000
stack
page read and write
471E000
stack
page read and write
233D000
trusted library allocation
page execute and read and write
2330000
trusted library allocation
page read and write
650000
heap
page read and write
2530000
trusted library allocation
page read and write
970000
heap
page read and write
24EF000
stack
page read and write
234A000
trusted library allocation
page execute and read and write
71E000
heap
page read and write
2390000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
5E0000
heap
page read and write
7F0000
heap
page read and write
2370000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
2380000
trusted library allocation
page execute and read and write
753000
heap
page read and write
2346000
trusted library allocation
page execute and read and write
235B000
trusted library allocation
page execute and read and write
718000
heap
page read and write
2357000
trusted library allocation
page execute and read and write
4EC0000
trusted library section
page read and write
6F421000
unkown
page execute read
4A60000
heap
page read and write
2324000
trusted library allocation
page read and write
B7F000
stack
page read and write
4B9E000
stack
page read and write
2578000
heap
page read and write
94E000
stack
page read and write
82000
unkown
page readonly
4AB0000
trusted library allocation
page read and write
78D000
heap
page read and write
7B2000
heap
page read and write
2355000
trusted library allocation
page execute and read and write
6F43F000
unkown
page readonly
3815000
trusted library allocation
page read and write
2336000
trusted library allocation
page read and write
23A0000
heap
page execute and read and write
3581000
trusted library allocation
page read and write
90E000
stack
page read and write
4AE0000
heap
page read and write
710000
heap
page read and write
797000
heap
page read and write
23EE000
stack
page read and write
3587000
trusted library allocation
page read and write
252D000
stack
page read and write
4EBE000
stack
page read and write
2570000
heap
page read and write
4BC0000
heap
page execute and read and write
745000
heap
page read and write
358D000
trusted library allocation
page read and write
A7F000
stack
page read and write
2581000
trusted library allocation
page read and write
6DE000
stack
page read and write
1CA000
stack
page read and write
2340000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
4F70000
heap
page read and write
4CC0000
heap
page read and write
6F420000
unkown
page readonly
960000
trusted library allocation
page read and write
80000
unkown
page readonly
69E000
stack
page read and write
620000
heap
page read and write
2641000
trusted library allocation
page read and write
6F43D000
unkown
page read and write
2323000
trusted library allocation
page execute and read and write
6F436000
unkown
page readonly
160000
heap
page read and write
232D000
trusted library allocation
page execute and read and write
78B000
heap
page read and write
There are 63 hidden memdumps, click here to show them.