IOC Report
20240328-REV2.exe

loading gif

Files

File Path
Type
Category
Malicious
20240328-REV2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_20240328-REV2.ex_d0d499a9646a641b819fa0255edad0bdab418090_3cf00dc3_f546981a-4c8e-4734-9074-23d81c861b04\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DE2.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:06:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER60A2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6101.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20240328-REV2.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e22pavwa.f3a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tckzrrwj.5ng.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yakagxcv.e30.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv2kgg4g.glx.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\20240328-REV2.exe
"C:\Users\user\Desktop\20240328-REV2.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\20240328-REV2.exe"
malicious
C:\Users\user\Desktop\20240328-REV2.exe
"C:\Users\user\Desktop\20240328-REV2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6840 -s 1796
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://mbarieservicesltd.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.mbarieservicesltd.com
unknown

Domains

Name
IP
Malicious
mbarieservicesltd.com
199.79.62.115
malicious
mail.mbarieservicesltd.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
199.79.62.115
mbarieservicesltd.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
ProgramId
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
FileId
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
LowerCaseLongPath
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
LongPathHash
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Name
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
OriginalFileName
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Publisher
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Version
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
BinFileVersion
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
BinaryType
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
ProductName
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
ProductVersion
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
LinkDate
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
BinProductVersion
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
AppxPackageFullName
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
AppxPackageRelativeId
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Size
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Language
\REGISTRY\A\{bb2554b6-545c-838e-c755-e66c0079e870}\Root\InventoryApplicationFile\20240328-rev2.ex|abaee9cbe36b71a6
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
6D50000
trusted library section
page read and write
malicious
2941000
trusted library allocation
page read and write
malicious
299A000
trusted library allocation
page read and write
malicious
3799000
trusted library allocation
page read and write
malicious
4187000
trusted library allocation
page read and write
malicious
70B0000
trusted library allocation
page execute and read and write
CF0000
heap
page read and write
3AE000
unkown
page readonly
61F0000
trusted library allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
278F000
stack
page read and write
2770000
trusted library allocation
page read and write
CAA000
trusted library allocation
page execute and read and write
AFF0000
trusted library allocation
page read and write
8ACE000
stack
page read and write
507E000
stack
page read and write
2765000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
28AD000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
E16000
trusted library allocation
page execute and read and write
26EC000
stack
page read and write
27E8000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
4F3E000
stack
page read and write
24EE000
stack
page read and write
D79C000
stack
page read and write
66EE000
stack
page read and write
6D91000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
4EFE000
stack
page read and write
281E000
trusted library allocation
page read and write
4C20000
heap
page read and write
6150000
trusted library allocation
page execute and read and write
75F0000
heap
page read and write
CE0000
heap
page read and write
5BA000
stack
page read and write
AD5000
heap
page read and write
65A000
stack
page read and write
4889000
stack
page read and write
517E000
stack
page read and write
2791000
trusted library allocation
page read and write
D3EE000
stack
page read and write
27C0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
5D20000
heap
page read and write
908000
heap
page read and write
CE4000
trusted library allocation
page read and write
25EE000
stack
page read and write
5A34000
heap
page read and write
62CE000
stack
page read and write
2721000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
ED0000
trusted library allocation
page execute and read and write
6B00000
heap
page read and write
985000
heap
page read and write
84E000
stack
page read and write
860000
heap
page read and write
9ED000
heap
page read and write
617C000
trusted library allocation
page read and write
765B000
heap
page read and write
7202000
trusted library allocation
page read and write
52BE000
stack
page read and write
2760000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
4C40000
trusted library allocation
page execute and read and write
4D50000
trusted library allocation
page read and write
5320000
heap
page read and write
CED000
trusted library allocation
page execute and read and write
4F67000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
D00000
heap
page read and write
5E70000
trusted library allocation
page read and write
AC19000
trusted library allocation
page read and write
618D000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
4D70000
trusted library section
page readonly
4BE0000
trusted library allocation
page read and write
4F4E000
stack
page read and write
4F40000
trusted library allocation
page read and write
4D90000
heap
page read and write
289A000
trusted library allocation
page read and write
B2F000
stack
page read and write
5E80000
heap
page read and write
6179000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
5E90000
trusted library allocation
page read and write
4A3D000
stack
page read and write
CA0000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
271E000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
6D4E000
stack
page read and write
E25000
trusted library allocation
page execute and read and write
29E2000
trusted library allocation
page read and write
4F73000
heap
page read and write
4F50000
trusted library allocation
page read and write
8950000
trusted library allocation
page execute and read and write
CB2000
trusted library allocation
page read and write
4F70000
heap
page read and write
289E000
trusted library allocation
page read and write
CB7000
trusted library allocation
page execute and read and write
6FBE000
heap
page read and write
6180000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
CE3000
trusted library allocation
page execute and read and write
63CE000
stack
page read and write
7B0000
heap
page read and write
28B2000
trusted library allocation
page read and write
EE0000
heap
page read and write
2740000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
C9D000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
4F8E000
stack
page read and write
CA2000
trusted library allocation
page read and write
628D000
stack
page read and write
92B000
heap
page read and write
6E90000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
938000
heap
page read and write
2A17000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
4F0E000
stack
page read and write
280D000
trusted library allocation
page read and write
280A000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
61A4000
trusted library allocation
page read and write
310000
unkown
page readonly
288B000
trusted library allocation
page read and write
6DF0000
trusted library section
page read and write
6FAE000
stack
page read and write
C8D000
trusted library allocation
page execute and read and write
4000000
trusted library allocation
page read and write
C6F000
stack
page read and write
2600000
heap
page read and write
C93000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
29A8000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
5D6E000
heap
page read and write
C90000
trusted library allocation
page read and write
A70000
heap
page read and write
6177000
trusted library allocation
page read and write
529F000
stack
page read and write
51BE000
stack
page read and write
5D43000
heap
page read and write
757000
stack
page read and write
E8E000
stack
page read and write
27A0000
heap
page read and write
2A30000
trusted library allocation
page read and write
86E000
heap
page read and write
E2B000
trusted library allocation
page execute and read and write
61B4000
trusted library allocation
page read and write
25F0000
trusted library allocation
page execute and read and write
89F000
heap
page read and write
7622000
heap
page read and write
5A10000
heap
page read and write
B0E0000
trusted library section
page read and write
400000
remote allocation
page execute and read and write
4D80000
heap
page read and write
4C60000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
6DDE000
stack
page read and write
9E6000
heap
page read and write
86A000
heap
page read and write
4EBC000
stack
page read and write
2726000
trusted library allocation
page read and write
4C50000
heap
page execute and read and write
763D000
heap
page read and write
9EF000
heap
page read and write
E27000
trusted library allocation
page execute and read and write
4D93000
heap
page read and write
4F60000
trusted library allocation
page read and write
26AD000
stack
page read and write
6DE0000
trusted library allocation
page read and write
7F770000
trusted library allocation
page execute and read and write
2CC2000
trusted library allocation
page read and write
9CB000
heap
page read and write
75E0000
heap
page read and write
2780000
heap
page execute and read and write
28F0000
heap
page execute and read and write
6D80000
trusted library section
page read and write
519E000
stack
page read and write
6160000
heap
page read and write
D52E000
stack
page read and write
AD0000
heap
page read and write
75F4000
heap
page read and write
936000
heap
page read and write
5A00000
heap
page read and write
8940000
trusted library allocation
page read and write
7646000
heap
page read and write
99A000
heap
page read and write
7032000
heap
page read and write
3941000
trusted library allocation
page read and write
288E000
trusted library allocation
page read and write
7B5000
heap
page read and write
D08000
heap
page read and write
6C4E000
stack
page read and write
4DBC000
stack
page read and write
509D000
stack
page read and write
E40000
trusted library allocation
page read and write
D69C000
stack
page read and write
8A1000
heap
page read and write
CA6000
trusted library allocation
page execute and read and write
28C0000
trusted library allocation
page read and write
4C30000
heap
page read and write
409C000
trusted library allocation
page read and write
4D29000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
4F95000
heap
page read and write
6D70000
trusted library allocation
page execute and read and write
C83000
trusted library allocation
page execute and read and write
CD0000
trusted library allocation
page read and write
312000
unkown
page readonly
7C0000
heap
page read and write
800000
heap
page read and write
4ECB000
stack
page read and write
75EC000
heap
page read and write
CBB000
trusted library allocation
page execute and read and write
264E000
stack
page read and write
ECC000
stack
page read and write
2750000
trusted library allocation
page read and write
3949000
trusted library allocation
page read and write
D42E000
stack
page read and write
59FE000
stack
page read and write
27F6000
trusted library allocation
page read and write
900000
heap
page read and write
E00000
trusted library allocation
page read and write
6B0E000
heap
page read and write
27D0000
heap
page read and write
2930000
heap
page execute and read and write
894000
heap
page read and write
E22000
trusted library allocation
page read and write
4F90000
heap
page read and write
E1A000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
764E000
heap
page read and write
8F8000
stack
page read and write
B6E000
stack
page read and write
70C5000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
765D000
heap
page read and write
C84000
trusted library allocation
page read and write
5E60000
trusted library allocation
page execute and read and write
There are 244 hidden memdumps, click here to show them.