IOC Report
Bank Swift Payment.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
Bank Swift Payment.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bank Swift Payment.bat.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1s22uek3.rpy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njrozhuy.yv2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xfvi515l.wfl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytwdzvdo.iw1.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Bank Swift Payment.bat.exe
"C:\Users\user\Desktop\Bank Swift Payment.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Swift Payment.bat.exe"
malicious
C:\Users\user\Desktop\Bank Swift Payment.bat.exe
"C:\Users\user\Desktop\Bank Swift Payment.bat.exe"
malicious
C:\Users\user\Desktop\Bank Swift Payment.bat.exe
"C:\Users\user\Desktop\Bank Swift Payment.bat.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.130.0
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.48.1
https://reallyfreegeoip.org/xml/8.46.123.189l
unknown
http://checkip.dyndns.comd
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.orgd
unknown
https://reallyfreegeoip.org/xml/8.46.123.189d
unknown
http://reallyfreegeoip.org
unknown
http://checkip.dyndns.orgd
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://checkip.dyndns.org/d
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.48.1
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
104.21.48.1
reallyfreegeoip.org
United States
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Bank Swift Payment_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
374C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4FC6000
trusted library allocation
page read and write
2A10000
heap
page execute and read and write
E60000
trusted library allocation
page read and write
3B84000
trusted library allocation
page read and write
4B1E000
trusted library allocation
page read and write
B51F000
stack
page read and write
4C8C000
stack
page read and write
D30000
trusted library allocation
page read and write
D40000
heap
page read and write
4BB0000
trusted library allocation
page read and write
F77000
heap
page read and write
EB8000
heap
page read and write
6860000
heap
page read and write
5E3E000
stack
page read and write
241D000
trusted library allocation
page execute and read and write
E82000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
2550000
trusted library allocation
page execute and read and write
E9B000
trusted library allocation
page execute and read and write
4C20000
trusted library allocation
page execute and read and write
6E49000
trusted library allocation
page read and write
7F360000
trusted library allocation
page execute and read and write
506A000
trusted library allocation
page read and write
5770000
heap
page read and write
5760000
heap
page read and write
4FD2000
trusted library allocation
page read and write
1050000
trusted library allocation
page execute and read and write
A24000
heap
page read and write
B7FD000
stack
page read and write
5060000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
6F62000
trusted library allocation
page read and write
B050000
heap
page read and write
B2E000
stack
page read and write
2A50000
heap
page read and write
287A000
trusted library allocation
page read and write
6330000
trusted library allocation
page execute and read and write
4B26000
trusted library allocation
page read and write
DD0000
heap
page read and write
639000
stack
page read and write
2560000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
69DB000
heap
page read and write
4FAB000
trusted library allocation
page read and write
2420000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
977000
heap
page read and write
4C5E000
stack
page read and write
2A40000
trusted library allocation
page read and write
6B5E000
stack
page read and write
938000
heap
page read and write
E7D000
trusted library allocation
page execute and read and write
F43000
heap
page read and write
2BDE000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
2450000
trusted library allocation
page read and write
47BC000
stack
page read and write
62D0000
trusted library allocation
page execute and read and write
4E50000
heap
page execute and read and write
5BFE000
stack
page read and write
DD7000
heap
page read and write
312000
unkown
page readonly
2A94000
trusted library allocation
page read and write
EB0000
heap
page read and write
2C58000
trusted library allocation
page read and write
4BD0000
heap
page read and write
2460000
heap
page read and write
4BF3000
heap
page read and write
ECE000
heap
page read and write
E86000
trusted library allocation
page execute and read and write
521E000
stack
page read and write
552E000
stack
page read and write
62E0000
trusted library allocation
page read and write
6DEE000
stack
page read and write
3689000
trusted library allocation
page read and write
2432000
trusted library allocation
page read and write
61BE000
stack
page read and write
1070000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
4E30000
heap
page read and write
6AD0000
heap
page read and write
69AA000
heap
page read and write
4FC1000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
A39000
stack
page read and write
5070000
trusted library allocation
page read and write
267F000
stack
page read and write
5F7E000
stack
page read and write
2C4E000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page execute and read and write
5DFE000
stack
page read and write
4B60000
trusted library allocation
page read and write
6960000
heap
page read and write
2C84000
trusted library allocation
page read and write
546E000
stack
page read and write
23F0000
trusted library allocation
page read and write
73696000
unkown
page readonly
2C45000
trusted library allocation
page read and write
FFE000
stack
page read and write
3BBB000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
4B0B000
trusted library allocation
page read and write
2404000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
2422000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
F36000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4BE6000
trusted library allocation
page read and write
85A0000
trusted library section
page read and write
29F0000
trusted library allocation
page read and write
8DE000
stack
page read and write
61C0000
heap
page read and write
4FB0000
trusted library allocation
page read and write
B6BC000
stack
page read and write
310000
unkown
page readonly
2C07000
trusted library allocation
page read and write
B18D000
stack
page read and write
4B00000
trusted library allocation
page read and write
607E000
stack
page read and write
73681000
unkown
page execute read
A03000
heap
page read and write
2570000
heap
page execute and read and write
890000
heap
page read and write
4E40000
heap
page read and write
24B8000
trusted library allocation
page read and write
FA1000
heap
page read and write
7369F000
unkown
page readonly
390000
unkown
page readonly
2C3A000
trusted library allocation
page read and write
6B60000
trusted library section
page read and write
4B21000
trusted library allocation
page read and write
2437000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
4B50000
trusted library allocation
page read and write
C2F000
stack
page read and write
51AE000
stack
page read and write
4BF0000
heap
page read and write
5060000
heap
page read and write
864E000
stack
page read and write
2410000
trusted library allocation
page read and write
9DD000
heap
page read and write
E80000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page execute and read and write
E92000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
B910000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
242A000
trusted library allocation
page execute and read and write
4FBA000
trusted library allocation
page read and write
62E8000
trusted library allocation
page read and write
2403000
trusted library allocation
page execute and read and write
B7BC000
stack
page read and write
5F3F000
stack
page read and write
2B61000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
4EE0000
heap
page read and write
103E000
stack
page read and write
4C90000
trusted library section
page readonly
780000
heap
page read and write
5065000
heap
page read and write
686E000
heap
page read and write
5040000
trusted library allocation
page read and write
EE8000
heap
page read and write
4FA0000
trusted library allocation
page read and write
9B0000
heap
page read and write
2C6D000
trusted library allocation
page read and write
E97000
trusted library allocation
page execute and read and write
2430000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
505D000
stack
page read and write
E95000
trusted library allocation
page execute and read and write
874E000
stack
page read and write
969000
heap
page read and write
73680000
unkown
page readonly
860000
heap
page read and write
930000
heap
page read and write
B28E000
stack
page read and write
6207000
heap
page read and write
B2DE000
stack
page read and write
B04D000
stack
page read and write
2C71000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
AF4F000
stack
page read and write
92E000
stack
page read and write
6DAE000
stack
page read and write
2400000
trusted library allocation
page read and write
7369D000
unkown
page read and write
2CB4000
trusted library allocation
page read and write
2426000
trusted library allocation
page execute and read and write
24AE000
stack
page read and write
5795000
heap
page read and write
6E2E000
stack
page read and write
B37000
stack
page read and write
516E000
stack
page read and write
E8A000
trusted library allocation
page execute and read and write
4FA0000
trusted library allocation
page read and write
501D000
stack
page read and write
B41E000
stack
page read and write
2C1D000
trusted library allocation
page read and write
554A000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
D50000
heap
page read and write
2BFB000
trusted library allocation
page read and write
4FBE000
trusted library allocation
page read and write
3681000
trusted library allocation
page read and write
E63000
trusted library allocation
page execute and read and write
6340000
heap
page read and write
4BEB000
trusted library allocation
page read and write
93E000
heap
page read and write
1060000
trusted library allocation
page read and write
6883000
heap
page read and write
240D000
trusted library allocation
page execute and read and write
54AE000
stack
page read and write
4C30000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6D6E000
stack
page read and write
60BE000
stack
page read and write
2BC2000
trusted library allocation
page read and write
2B5E000
stack
page read and write
6C6E000
stack
page read and write
EDA000
heap
page read and write
8600000
trusted library allocation
page execute and read and write
A14000
heap
page read and write
243B000
trusted library allocation
page execute and read and write
E64000
trusted library allocation
page read and write
4B2D000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
4B65000
trusted library allocation
page read and write
B90000
heap
page read and write
4FCD000
trusted library allocation
page read and write
E6D000
trusted library allocation
page execute and read and write
E70000
trusted library allocation
page read and write
8E0000
heap
page read and write
29F9000
trusted library allocation
page read and write
2762000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
62C0000
trusted library allocation
page execute and read and write
9CB000
heap
page read and write
737000
stack
page read and write
4B32000
trusted library allocation
page read and write
5220000
heap
page execute and read and write
6310000
trusted library allocation
page execute and read and write
2C7E000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
46BC000
stack
page read and write
3B8D000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
AE4F000
stack
page read and write
6450000
heap
page read and write
4C00000
trusted library allocation
page read and write
CB0000
heap
page read and write
4B40000
trusted library allocation
page read and write
B8FE000
stack
page read and write
1043000
heap
page read and write
B3DE000
stack
page read and write
1040000
heap
page read and write
2C61000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
There are 258 hidden memdumps, click here to show them.