IOC Report
AO_RDS01_2024-04-18_16_39_30.221.zip

loading gif

Files

File Path
Type
Category
Malicious
AO_RDS01_2024-04-18_16_39_30.221.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\Desktop\AO_RDS01_2024-04-18_16_39_30.221\Device\HarddiskVolume4\Users\jjohnson\Music\AccountRestore.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AO_RDS01_2024-04-18_16_39_30.221\manifest.json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AO_RDS01_2024-04-18_16_39_30.221\Device\HarddiskVolume4\Users\jjohnson\Music\AccountRestore.exe
"C:\Users\user\Desktop\AO_RDS01_2024-04-18_16_39_30.221C:\Users\jjohnson\Music\AccountRestore.exe"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\AO_RDS01_2024-04-18_16_39_30.221\" -spe -an -ai#7zMap23008:124:7zEvent13671

URLs

Name
IP
Malicious
http://foo/View/MainWindow.xamll
unknown
http://defaultcontainer/View/MainWindow.xamll
unknown
http://foo/bar/view/mainwindow.bamll
unknown
http://defaultcontainer/View/MainWindow.xamlP
unknown
http://foo/bar/view/mainwindow.bamlP
unknown
http://foo/View/MainWindow.xamlP
unknown
http://foo/bar/view/mainwindow.baml
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
2
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\23\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots

Memdumps

Base Address
Regiontype
Protect
Malicious
ABB0000
trusted library allocation
page read and write
980C000
stack
page read and write
9FA9000
stack
page read and write
14073D70000
heap
page read and write
57A2000
heap
page read and write
7D65000
heap
page read and write
FF821000
trusted library allocation
page execute read
AB70000
trusted library allocation
page read and write
286597C0000
heap
page read and write
14073F10000
heap
page read and write
7C15000
heap
page read and write
5629000
heap
page read and write
26F5000
trusted library allocation
page execute and read and write
BEF0000
heap
page read and write
947000
heap
page read and write
B240000
trusted library allocation
page read and write
543F000
stack
page read and write
7D42000
heap
page read and write
28659450000
heap
page read and write
A1EB000
stack
page read and write
A329000
stack
page read and write
E6FA000
stack
page read and write
5642000
heap
page read and write
5A99000
stack
page read and write
AB99000
trusted library allocation
page read and write
FF836000
trusted library allocation
page execute read
28659530000
heap
page read and write
9C3000
heap
page read and write
55F8000
stack
page read and write
14073E1A000
heap
page read and write
ABF7000
trusted library allocation
page read and write
8F6000
stack
page read and write
C370000
trusted library section
page read and write
5700000
heap
page read and write
7C0B000
heap
page read and write
57A9000
heap
page read and write
FF832000
trusted library allocation
page execute read
9C9F000
heap
page read and write
14073E2C000
heap
page read and write
B220000
trusted library allocation
page read and write
9770000
trusted library allocation
page execute and read and write
2870000
trusted library allocation
page read and write
EFE000
stack
page read and write
FF820000
trusted library allocation
page readonly
14073DFF000
heap
page read and write
7CB3000
heap
page read and write
AB8E000
trusted library allocation
page read and write
14073E29000
heap
page read and write
25A5AFD000
stack
page read and write
5013000
heap
page execute and read and write
AF7B000
heap
page read and write
26C3000
trusted library allocation
page execute and read and write
ABA5000
trusted library allocation
page read and write
7C2F000
heap
page read and write
FF83B000
trusted library allocation
page readonly
9CA7000
heap
page read and write
14073E1B000
heap
page read and write
14073F30000
trusted library allocation
page read and write
AC5B000
heap
page read and write
4E60000
heap
page read and write
9C5B000
heap
page read and write
14073E10000
heap
page read and write
AF61000
heap
page read and write
DFDD6FF000
stack
page read and write
26F2000
trusted library allocation
page read and write
A7B000
heap
page read and write
ABA2000
trusted library allocation
page read and write
1090000
heap
page read and write
14075E40000
trusted library allocation
page read and write
BEE0000
heap
page read and write
57BC000
heap
page read and write
5618000
heap
page read and write
E7FC000
stack
page read and write
AF75000
heap
page read and write
AF0D000
heap
page read and write
A22B000
stack
page read and write
AEB8000
heap
page read and write
5783000
heap
page read and write
5F0000
heap
page read and write
4EA000
unkown
page readonly
14075E30000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
9C14000
heap
page read and write
25A5FFF000
stack
page read and write
7CFD000
heap
page read and write
595C000
stack
page read and write
5E0000
heap
page read and write
5622000
heap
page read and write
28659370000
heap
page read and write
5010000
heap
page execute and read and write
28E0000
trusted library allocation
page read and write
A73000
heap
page read and write
574B000
heap
page read and write
26CD000
trusted library allocation
page execute and read and write
AE9E000
heap
page read and write
FF83E000
trusted library allocation
page execute read
549C000
stack
page read and write
575A000
heap
page read and write
14075700000
heap
page read and write
54A0000
heap
page read and write
3901000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
A0AA000
stack
page read and write
9E70000
trusted library allocation
page execute and read and write
570E000
heap
page read and write
9E90000
trusted library allocation
page read and write
5754000
heap
page read and write
5600000
heap
page read and write
14073E10000
heap
page read and write
4E10000
trusted library allocation
page read and write
285E000
stack
page read and write
26D0000
trusted library allocation
page read and write
7D5F000
heap
page read and write
DFDD7FF000
stack
page read and write
7CED000
heap
page read and write
A33000
heap
page read and write
2865AF90000
heap
page read and write
14073DD0000
heap
page read and write
A26000
heap
page read and write
FF83A000
trusted library allocation
page execute read
26E0000
trusted library allocation
page read and write
ACEE000
heap
page read and write
EA6E000
stack
page read and write
B280000
trusted library allocation
page read and write
26D9000
trusted library allocation
page read and write
14073E35000
heap
page read and write
940000
heap
page read and write
AD34000
heap
page read and write
7DC5000
heap
page read and write
9CD8000
heap
page read and write
26C4000
trusted library allocation
page read and write
4E00000
heap
page read and write
B3AC000
stack
page read and write
AB7B000
trusted library allocation
page read and write
AD30000
heap
page read and write
9B3000
heap
page read and write
FF838000
trusted library allocation
page execute read
9832000
trusted library allocation
page read and write
56E000
stack
page read and write
4E64000
heap
page read and write
ABF1000
trusted library allocation
page read and write
7CF6000
heap
page read and write
93E000
stack
page read and write
533E000
stack
page read and write
AB96000
trusted library allocation
page read and write
A45000
heap
page read and write
CBE000
stack
page read and write
14073D50000
heap
page read and write
51FE000
stack
page read and write
26B0000
trusted library allocation
page read and write
9E80000
trusted library allocation
page read and write
7D04000
heap
page read and write
AB7E000
trusted library allocation
page read and write
AF5B000
heap
page read and write
26F7000
trusted library allocation
page execute and read and write
AB84000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
FF831000
trusted library allocation
page readonly
25A577A000
stack
page read and write
561A000
heap
page read and write
7D3A000
heap
page read and write
97CC000
stack
page read and write
14073EF3000
heap
page read and write
2901000
trusted library allocation
page read and write
14073E17000
heap
page read and write
5767000
heap
page read and write
28659539000
heap
page read and write
26DD000
trusted library allocation
page execute and read and write
25A5CFE000
stack
page read and write
7DC0000
heap
page read and write
C22C000
stack
page read and write
5789000
heap
page read and write
98B000
heap
page read and write
7D73000
heap
page read and write
7DB7000
heap
page read and write
ABE0000
trusted library allocation
page read and write
14073F50000
heap
page read and write
14073E35000
heap
page read and write
5610000
heap
page read and write
B5D0000
heap
page read and write
7D6A000
heap
page read and write
500E000
stack
page read and write
AC00000
trusted library allocation
page read and write
7D82000
heap
page read and write
98E000
heap
page read and write
52FE000
stack
page read and write
57E3000
heap
page read and write
8E60000
trusted library allocation
page read and write
980000
heap
page read and write
EB6E000
stack
page read and write
25A5BFE000
stack
page read and write
DFDD67C000
stack
page read and write
14073F55000
heap
page read and write
5744000
heap
page read and write
14073E1C000
heap
page read and write
A79000
heap
page read and write
599B000
stack
page read and write
7D02000
heap
page read and write
ADF1000
heap
page read and write
14073E11000
heap
page read and write
FF839000
trusted library allocation
page readonly
B270000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
7D57000
heap
page read and write
14073EF0000
heap
page read and write
7D68000
heap
page read and write
14073E07000
heap
page read and write
5799000
heap
page read and write
FF83C000
trusted library allocation
page execute read
AE01000
heap
page read and write
5810000
trusted library allocation
page read and write
ABD0000
trusted library allocation
page execute and read and write
4E2000
unkown
page readonly
25A5EFE000
stack
page read and write
14073E1B000
heap
page read and write
ACE6000
heap
page read and write
7BD0000
heap
page read and write
5733000
heap
page read and write
B5AF000
stack
page read and write
5440000
trusted library allocation
page execute and read and write
3911000
trusted library allocation
page read and write
FF830000
trusted library allocation
page execute read
57E1000
heap
page read and write
FF834000
trusted library allocation
page execute read
26F0000
trusted library allocation
page read and write
14073E03000
heap
page read and write
28F0000
heap
page read and write
C7E000
stack
page read and write
960000
heap
page read and write
505E000
stack
page read and write
7BEE000
heap
page read and write
7C9B000
heap
page read and write
ACA2000
heap
page read and write
574E000
heap
page read and write
14073DE3000
heap
page read and write
140775C0000
trusted library allocation
page read and write
9E19000
stack
page read and write
DFDD77E000
stack
page read and write
FF823000
trusted library allocation
page execute read
B5E0000
heap
page read and write
2860000
trusted library allocation
page execute and read and write
26C0000
trusted library allocation
page read and write
7D51000
heap
page read and write
9D1C000
stack
page read and write
57DE000
heap
page read and write
545D000
trusted library allocation
page read and write
AF8D000
heap
page read and write
7CBC000
heap
page read and write
FF825000
trusted library allocation
page execute read
B230000
trusted library allocation
page read and write
AB9D000
trusted library allocation
page read and write
579E000
heap
page read and write
5718000
heap
page read and write
9C9D000
heap
page read and write
DFE000
stack
page read and write
14073E11000
heap
page read and write
26E6000
trusted library allocation
page execute and read and write
AE43000
heap
page read and write
7D08000
heap
page read and write
A5E000
heap
page read and write
26E2000
trusted library allocation
page read and write
563B000
heap
page read and write
AB88000
trusted library allocation
page read and write
5737000
heap
page read and write
26FB000
trusted library allocation
page execute and read and write
1095000
heap
page read and write
A70000
heap
page read and write
7C69000
heap
page read and write
FF83D000
trusted library allocation
page readonly
14073DD7000
heap
page read and write
14073C70000
heap
page read and write
14073E1A000
heap
page read and write
AB91000
trusted library allocation
page read and write
7DA3000
heap
page read and write
A330000
trusted library allocation
page read and write
FF837000
trusted library allocation
page readonly
ABC0000
trusted library allocation
page read and write
AD1F000
heap
page read and write
AF6D000
heap
page read and write
5800000
heap
page execute and read and write
14073E0D000
heap
page read and write
7DCB000
heap
page read and write
14077590000
trusted library allocation
page read and write
AB74000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
ACE4000
heap
page read and write
AA0000
heap
page read and write
4A9E000
stack
page read and write
14073E11000
heap
page read and write
AA6000
heap
page read and write
DBE000
stack
page read and write
C03C000
stack
page read and write
286597C5000
heap
page read and write
585B000
stack
page read and write
ABB9000
trusted library allocation
page read and write
14073E2D000
heap
page read and write
28659470000
heap
page read and write
2865953E000
heap
page read and write
14075710000
heap
page read and write
28CD000
stack
page read and write
275E000
stack
page read and write
4E0000
unkown
page readonly
2880000
heap
page execute and read and write
14073E10000
heap
page read and write
A0EC000
stack
page read and write
7D9F000
heap
page read and write
571C000
heap
page read and write
AF5E000
heap
page read and write
14073E32000
heap
page read and write
57FB000
heap
page read and write
There are 300 hidden memdumps, click here to show them.