IOC Report
Leoch-Purchase Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Leoch-Purchase Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Leoch-Purchase Order.exe
"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
malicious
C:\Users\user\Desktop\Leoch-Purchase Order.exe
"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
malicious
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
malicious
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
malicious
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
http://mail.voivocars.com
unknown
http://www.microsoft.c
unknown
https://account.dyn.com/
unknown
http://microsoft.coo
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.voivocars.com
46.175.145.107
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
46.175.145.107
mail.voivocars.com
Ukraine
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
uaAWu
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
334C000
trusted library allocation
page read and write
malicious
2D21000
trusted library allocation
page read and write
malicious
2D4C000
trusted library allocation
page read and write
malicious
3A74000
trusted library allocation
page read and write
malicious
436000
remote allocation
page execute and read and write
malicious
4F60000
direct allocation
page execute and read and write
malicious
3321000
trusted library allocation
page read and write
malicious
F42000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
1440000
heap
page read and write
CF4000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6F4D000
stack
page read and write
514E000
stack
page read and write
7050000
trusted library allocation
page read and write
D17000
trusted library allocation
page execute and read and write
6A0F000
stack
page read and write
D2D000
heap
page read and write
32D1000
trusted library allocation
page read and write
895000
heap
page read and write
1892000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
F47000
trusted library allocation
page execute and read and write
1528000
heap
page read and write
5150000
heap
page read and write
3D3C000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6C4E000
stack
page read and write
A7D000
trusted library allocation
page execute and read and write
7F100000
trusted library allocation
page execute and read and write
545E000
stack
page read and write
CF0000
trusted library allocation
page read and write
D28000
heap
page read and write
325E000
trusted library allocation
page read and write
F1D000
trusted library allocation
page execute and read and write
D1B000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page execute and read and write
383B000
trusted library allocation
page read and write
572D000
stack
page read and write
79A000
stack
page read and write
402000
remote allocation
page execute and read and write
6B90000
heap
page read and write
68CE000
stack
page read and write
18C0000
trusted library allocation
page read and write
1874000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
3354000
trusted library allocation
page read and write
25B0000
heap
page execute and read and write
17A0000
trusted library allocation
page read and write
5031000
trusted library allocation
page read and write
1380000
heap
page read and write
F50000
trusted library allocation
page read and write
501B000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
6A20000
heap
page read and write
335C000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
528F000
stack
page read and write
A9A000
trusted library allocation
page execute and read and write
1960000
trusted library allocation
page execute and read and write
5820000
heap
page read and write
6DCE000
stack
page read and write
1896000
trusted library allocation
page execute and read and write
65C000
stack
page read and write
163E000
stack
page read and write
F14000
trusted library allocation
page read and write
1670000
heap
page read and write
5070000
heap
page read and write
6AA2000
heap
page read and write
18A5000
trusted library allocation
page execute and read and write
3876000
trusted library allocation
page read and write
A84000
trusted library allocation
page read and write
1480000
heap
page read and write
299E000
stack
page read and write
CE0000
trusted library allocation
page read and write
18A2000
trusted library allocation
page read and write
6A2F000
heap
page read and write
A74000
trusted library allocation
page read and write
279E000
trusted library allocation
page read and write
6F07000
trusted library allocation
page read and write
559E000
stack
page read and write
5022000
trusted library allocation
page read and write
1339000
stack
page read and write
BFF000
stack
page read and write
14F7000
heap
page read and write
AF9000
stack
page read and write
F40000
trusted library allocation
page execute and read and write
32B0000
heap
page execute and read and write
D60000
heap
page read and write
A60000
trusted library allocation
page read and write
42F9000
trusted library allocation
page read and write
AF0000
heap
page read and write
CC6000
heap
page read and write
1390000
heap
page read and write
6D2000
unkown
page readonly
67E0000
trusted library allocation
page read and write
66E0000
trusted library allocation
page execute and read and write
648E000
stack
page read and write
549F000
stack
page read and write
D40000
heap
page read and write
F32000
trusted library allocation
page read and write
F07000
heap
page read and write
518E000
stack
page read and write
F13000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
433000
remote allocation
page execute and read and write
F4B000
trusted library allocation
page execute and read and write
1530000
heap
page read and write
18A7000
trusted library allocation
page execute and read and write
326A000
trusted library allocation
page read and write
6F60000
trusted library allocation
page execute and read and write
3276000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
1520000
heap
page read and write
3250000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
D10000
heap
page read and write
6EF7000
trusted library allocation
page read and write
514E000
stack
page read and write
C90000
heap
page read and write
D20000
heap
page read and write
3271000
trusted library allocation
page read and write
6A10000
heap
page read and write
152C000
stack
page read and write
4BAE000
stack
page read and write
6EF0000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
B00000
heap
page read and write
1420000
heap
page read and write
F3A000
trusted library allocation
page execute and read and write
CE4000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
19A0000
heap
page read and write
890000
heap
page read and write
C10000
heap
page read and write
3290000
trusted library allocation
page read and write
F70000
heap
page read and write
14B5000
heap
page read and write
32C0000
heap
page read and write
8A0000
heap
page read and write
664F000
stack
page read and write
330F000
trusted library allocation
page read and write
FBE000
stack
page read and write
19A7000
heap
page read and write
F36000
trusted library allocation
page execute and read and write
2570000
direct allocation
page execute and read and write
6F50000
heap
page read and write
1860000
trusted library allocation
page read and write
5CEE000
stack
page read and write
8EE000
stack
page read and write
188D000
trusted library allocation
page execute and read and write
1980000
trusted library allocation
page read and write
51CC000
stack
page read and write
545E000
stack
page read and write
5A2C000
stack
page read and write
2D4A000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
654E000
stack
page read and write
940000
heap
page read and write
EF0000
trusted library allocation
page read and write
5823000
heap
page read and write
D4B000
heap
page read and write
14AA000
heap
page read and write
6EFD000
trusted library allocation
page read and write
6ECE000
stack
page read and write
435000
remote allocation
page execute and read and write
4F7E000
stack
page read and write
3307000
trusted library allocation
page read and write
9C2000
heap
page read and write
1445000
heap
page read and write
980000
heap
page read and write
502A000
trusted library allocation
page read and write
6EF5000
trusted library allocation
page read and write
667D000
trusted library allocation
page read and write
D62000
heap
page read and write
75D000
stack
page read and write
DA5000
heap
page read and write
6687000
trusted library allocation
page read and write
AAB000
trusted library allocation
page execute and read and write
324F000
stack
page read and write
433D000
trusted library allocation
page read and write
5B6F000
stack
page read and write
189A000
trusted library allocation
page execute and read and write
255D000
stack
page read and write
D3E000
stack
page read and write
1873000
trusted library allocation
page execute and read and write
D1E000
heap
page read and write
36C4000
trusted library allocation
page read and write
1794000
trusted library allocation
page read and write
B20000
heap
page read and write
518D000
stack
page read and write
502E000
trusted library allocation
page read and write
D65000
heap
page read and write
66CE000
stack
page read and write
606E000
stack
page read and write
D70000
heap
page read and write
2D46000
trusted library allocation
page read and write
4DFE000
stack
page read and write
F00000
heap
page read and write
3CF9000
trusted library allocation
page read and write
26BE000
stack
page read and write
759000
stack
page read and write
67E7000
trusted library allocation
page read and write
6499000
heap
page read and write
7054000
trusted library allocation
page read and write
18AB000
trusted library allocation
page execute and read and write
D47000
heap
page read and write
4AAE000
stack
page read and write
325B000
trusted library allocation
page read and write
F2D000
trusted library allocation
page execute and read and write
65C000
stack
page read and write
5050000
heap
page read and write
1790000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1890000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
57EC000
stack
page read and write
1458000
trusted library allocation
page read and write
5DD0000
heap
page read and write
503D000
trusted library allocation
page read and write
7B0000
heap
page read and write
5042000
trusted library allocation
page read and write
CBA000
heap
page read and write
A80000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
7420000
trusted library allocation
page execute and read and write
690E000
stack
page read and write
AD0000
trusted library allocation
page execute and read and write
2A71000
trusted library allocation
page read and write
CAE000
heap
page read and write
CD0000
trusted library allocation
page read and write
94E000
heap
page read and write
10FF000
stack
page read and write
2D0F000
trusted library allocation
page read and write
5052000
heap
page read and write
4CA0000
trusted library allocation
page read and write
195C000
stack
page read and write
7067000
trusted library allocation
page read and write
1970000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
507E000
stack
page read and write
AF9000
stack
page read and write
1640000
trusted library allocation
page execute and read and write
528D000
stack
page read and write
187D000
trusted library allocation
page execute and read and write
1555000
heap
page read and write
D37000
heap
page read and write
FF0000
heap
page read and write
6A60000
heap
page read and write
144E000
stack
page read and write
678E000
stack
page read and write
948000
heap
page read and write
6D8E000
stack
page read and write
555E000
stack
page read and write
1680000
heap
page execute and read and write
5DAD000
stack
page read and write
334A000
trusted library allocation
page read and write
62EE000
stack
page read and write
546E000
stack
page read and write
422000
remote allocation
page execute and read and write
6BA0000
trusted library allocation
page execute and read and write
5BAE000
stack
page read and write
1559000
heap
page read and write
149E000
heap
page read and write
974000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
5016000
trusted library allocation
page read and write
A73000
trusted library allocation
page execute and read and write
1990000
trusted library allocation
page read and write
52CE000
stack
page read and write
64B5000
heap
page read and write
D2E000
heap
page read and write
CC8000
heap
page read and write
F60000
heap
page read and write
CFF000
stack
page read and write
569E000
stack
page read and write
66F0000
trusted library allocation
page execute and read and write
14B7000
heap
page read and write
2D5C000
trusted library allocation
page read and write
602E000
stack
page read and write
326E000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
61AE000
stack
page read and write
504E000
stack
page read and write
1673000
heap
page read and write
123A000
stack
page read and write
F1E000
stack
page read and write
6B50000
trusted library allocation
page read and write
66D0000
heap
page read and write
3762000
trusted library allocation
page read and write
190E000
stack
page read and write
5CAE000
stack
page read and write
5A6E000
stack
page read and write
531E000
stack
page read and write
6A95000
heap
page read and write
B30000
heap
page read and write
1880000
trusted library allocation
page read and write
62AE000
stack
page read and write
2D11000
trusted library allocation
page read and write
F45000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
C98000
heap
page read and write
8C0000
heap
page read and write
FD0000
heap
page read and write
6ABB000
heap
page read and write
2CD1000
trusted library allocation
page read and write
1910000
heap
page execute and read and write
6A62000
heap
page read and write
7410000
heap
page read and write
96C000
heap
page read and write
1488000
heap
page read and write
6B4E000
stack
page read and write
AA7000
trusted library allocation
page execute and read and write
43E000
remote allocation
page execute and read and write
7060000
trusted library allocation
page read and write
1450000
heap
page read and write
616E000
stack
page read and write
36C1000
trusted library allocation
page read and write
4F3E000
stack
page read and write
6452000
heap
page read and write
6EE8000
trusted library allocation
page read and write
75B0000
heap
page read and write
155F000
heap
page read and write
AE0000
trusted library allocation
page read and write
541E000
stack
page read and write
7BC000
stack
page read and write
4CFE000
stack
page read and write
5830000
heap
page read and write
F10000
trusted library allocation
page read and write
63EE000
stack
page read and write
421000
remote allocation
page execute and read and write
501E000
trusted library allocation
page read and write
C9E000
stack
page read and write
530E000
stack
page read and write
F20000
trusted library allocation
page read and write
6410000
heap
page read and write
6414000
heap
page read and write
4E3E000
stack
page read and write
485D000
stack
page read and write
73E0000
trusted library allocation
page read and write
CE3000
trusted library allocation
page execute and read and write
1796000
trusted library allocation
page read and write
510D000
stack
page read and write
52CE000
stack
page read and write
2D07000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
5730000
heap
page read and write
1553000
heap
page read and write
FC0000
direct allocation
page execute and read and write
C30000
heap
page read and write
2D54000
trusted library allocation
page read and write
D48000
heap
page read and write
6D0000
unkown
page readonly
423000
remote allocation
page execute and read and write
A70000
trusted library allocation
page read and write
53CF000
stack
page read and write
42D1000
trusted library allocation
page read and write
700F000
stack
page read and write
3348000
trusted library allocation
page read and write
7FA40000
trusted library allocation
page execute and read and write
331D000
trusted library allocation
page read and write
6C8E000
stack
page read and write
2A60000
heap
page execute and read and write
6668000
trusted library allocation
page read and write
5060000
heap
page read and write
D0A000
trusted library allocation
page execute and read and write
3262000
trusted library allocation
page read and write
5036000
trusted library allocation
page read and write
D54000
heap
page read and write
4FF0000
heap
page execute and read and write
6D90000
heap
page read and write
178E000
stack
page read and write
6B60000
trusted library allocation
page read and write
25A0000
heap
page execute and read and write
5180000
heap
page execute and read and write
C5E000
stack
page read and write
52CC000
stack
page read and write
CED000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
434000
remote allocation
page execute and read and write
There are 376 hidden memdumps, click here to show them.