IOC Report
PupkinStealer.exe

loading gif

Files

File Path
Type
Category
Malicious
PupkinStealer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PupkinStealer.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\user-PC\DotNetZip-mly1wotf.tmp
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user@ardent.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\BPMLNOBVSB.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\CURQNKVOIX.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\FENIVHOIKN.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\JSDNGYCOWY.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\MXPXCVPDVN.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\NIKHQAIQAU.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\SFPUSAFIOL.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\VAMYDFPUND.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\VAMYDFPUND.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\WKXEWIOTXI.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\ZBEDCJPBEY.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\DesktopFiles\ZQIXMVQGAH.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-PC\user\Grabbers\Screenshot\Screen.jpg
PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PupkinStealer.exe
"C:\Users\user\Desktop\PupkinStealer.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
https://urn.to/r/sds_see23https://urn.to/r/sds_see1UInnerVerify
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=A&caption=W
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.codeplex.com/DotNetZip
unknown
https://api.telegram.org/bot8013735771:AAE_UrTgQsAmiAsXeDN6mehD_fo3vEg-kCM/sendDocument
unknown
https://system.data.sqlite.org/X
unknown
https://www.newtonsoft.com/json
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://urn.to/r/sds_see12https://urn.to/r/sds_see2
unknown
http://api.telegram.org
unknown
https://api.telegram.org/bot8013735771:AAE_UrTgQsAmiAsXeDN6mehD_fo3vEg-kCM/sendDocument?chat_id=7613
unknown
https://system.data.sqlite.org/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://james.newtonking.com/projects/json
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PupkinStealer_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
270C9D7D000
trusted library allocation
page read and write
malicious
270C9C61000
trusted library allocation
page read and write
malicious
270C9D81000
trusted library allocation
page read and write
malicious
270C9D4C000
trusted library allocation
page read and write
malicious
270E24CB000
heap
page read and write
malicious
270C9D2E000
trusted library allocation
page read and write
malicious
270C9D1A000
trusted library allocation
page read and write
malicious
270C7902000
unkown
page readonly
malicious
CC9E9FC000
stack
page read and write
CC9E2FE000
stack
page read and write
7FF88B690000
trusted library allocation
page read and write
7FF88B3CD000
trusted library allocation
page execute and read and write
270E2700000
heap
page read and write
270CA163000
trusted library allocation
page read and write
7FF88B540000
trusted library allocation
page read and write
CC9DDFE000
stack
page read and write
270C9E77000
trusted library allocation
page read and write
270E2759000
heap
page read and write
270C81C6000
heap
page read and write
7FF88B3A0000
trusted library allocation
page read and write
270E2710000
heap
page read and write
270C9E9E000
trusted library allocation
page read and write
270CA0C1000
trusted library allocation
page read and write
270C8113000
heap
page read and write
270C84B5000
heap
page read and write
270E2724000
heap
page read and write
7FF88B5F0000
trusted library allocation
page read and write
7FF88B3FC000
trusted library allocation
page execute and read and write
270C7900000
unkown
page readonly
270C8270000
heap
page execute and read and write
7FF88B3C4000
trusted library allocation
page read and write
270CA05F000
trusted library allocation
page read and write
7FF41E310000
trusted library allocation
page execute and read and write
270C813D000
heap
page read and write
7FF88B640000
trusted library allocation
page read and write
270E2757000
heap
page read and write
270CA027000
trusted library allocation
page read and write
7FF88B5E0000
trusted library allocation
page read and write
270C9D6F000
trusted library allocation
page read and write
7FF88B6A0000
trusted library allocation
page execute and read and write
270CA14E000
trusted library allocation
page read and write
270E27A7000
heap
page read and write
270D9E98000
trusted library allocation
page read and write
270CA236000
trusted library allocation
page read and write
7FF88B730000
trusted library allocation
page read and write
CC9ECFE000
stack
page read and write
270C9D27000
trusted library allocation
page read and write
7FF88B566000
trusted library allocation
page read and write
270CA195000
trusted library allocation
page read and write
270E24C0000
heap
page read and write
270C7F38000
unkown
page readonly
270D9C6F000
trusted library allocation
page read and write
7FF88B460000
trusted library allocation
page execute and read and write
270D9C61000
trusted library allocation
page read and write
270E1FEB000
heap
page read and write
7FF88B750000
trusted library allocation
page read and write
270C9F9C000
trusted library allocation
page read and write
270C81C0000
heap
page read and write
270C9F02000
trusted library allocation
page read and write
270CA088000
trusted library allocation
page read and write
7FF88B3A4000
trusted library allocation
page read and write
7FF88B600000
trusted library allocation
page read and write
270C9FFE000
trusted library allocation
page read and write
270C9FC6000
trusted library allocation
page read and write
270CA025000
trusted library allocation
page read and write
270C80D6000
heap
page read and write
7FF88B6B0000
trusted library allocation
page execute and read and write
270C7FC0000
heap
page read and write
7FF88B560000
trusted library allocation
page read and write
CC9E8F5000
stack
page read and write
270E2430000
heap
page read and write
270C80D0000
heap
page read and write
270CA1B0000
trusted library allocation
page read and write
CC9E4FE000
stack
page read and write
7FF88B570000
trusted library allocation
page read and write
270C813B000
heap
page read and write
7FF88B5B0000
trusted library allocation
page read and write
7FF88B630000
trusted library allocation
page read and write
7FF88B3B0000
trusted library allocation
page read and write
270E249C000
heap
page read and write
270C8143000
heap
page read and write
270E2530000
trusted library section
page read and write
270C81F0000
heap
page read and write
7FF88B3AD000
trusted library allocation
page execute and read and write
270C80FB000
heap
page read and write
CC9E0FE000
stack
page read and write
270C8305000
heap
page read and write
7FF88B770000
trusted library allocation
page execute and read and write
270C8250000
trusted library allocation
page read and write
270C9E3F000
trusted library allocation
page read and write
CC9EEFD000
stack
page read and write
270C9DE0000
trusted library allocation
page read and write
270C9C10000
heap
page read and write
270E3C0B000
heap
page read and write
7FF88B580000
trusted library allocation
page read and write
CC9F0FE000
stack
page read and write
7FF88B486000
trusted library allocation
page execute and read and write
7FF88B620000
trusted library allocation
page read and write
270C9EA0000
trusted library allocation
page read and write
270C9E42000
trusted library allocation
page read and write
7FF88B5D0000
trusted library allocation
page read and write
CC9EDFE000
stack
page read and write
270CA02A000
trusted library allocation
page read and write
7FF88B456000
trusted library allocation
page read and write
270C84B0000
heap
page read and write
270C9C50000
heap
page read and write
270C8111000
heap
page read and write
7FF88B680000
trusted library allocation
page execute and read and write
7FF88B5A0000
trusted library allocation
page read and write
CC9DCF2000
stack
page read and write
270CA0ED000
trusted library allocation
page read and write
7FF88B760000
trusted library allocation
page read and write
270C8300000
heap
page read and write
7FF88B597000
trusted library allocation
page read and write
270C8230000
trusted library allocation
page read and write
270C9F00000
trusted library allocation
page read and write
270CA1D5000
trusted library allocation
page read and write
270C9F3B000
trusted library allocation
page read and write
CC9EBFD000
stack
page read and write
7FF88B450000
trusted library allocation
page read and write
270C9F62000
trusted library allocation
page read and write
CC9E6FB000
stack
page read and write
270C9DB4000
trusted library allocation
page read and write
270C9E16000
trusted library allocation
page read and write
270E2752000
heap
page read and write
270D9EA6000
trusted library allocation
page read and write
7FF88B55D000
trusted library allocation
page read and write
270C9D95000
trusted library allocation
page read and write
270E24DF000
heap
page read and write
7FF88B3A3000
trusted library allocation
page execute and read and write
270E2910000
trusted library section
page read and write
270E1C90000
trusted library allocation
page read and write
7FF88B3BD000
trusted library allocation
page execute and read and write
7FF88B590000
trusted library allocation
page read and write
270CA173000
trusted library allocation
page read and write
CC9EFFD000
stack
page read and write
270C9EA2000
trusted library allocation
page read and write
270C7900000
unkown
page readonly
270C9F67000
trusted library allocation
page read and write
270E36F0000
trusted library section
page read and write
270C9D93000
trusted library allocation
page read and write
270C80DC000
heap
page read and write
270C82A0000
trusted library allocation
page read and write
CC9E5F0000
stack
page read and write
270C9FC3000
trusted library allocation
page read and write
270C80A0000
heap
page read and write
270CA2FA000
trusted library allocation
page read and write
270D9CCD000
trusted library allocation
page read and write
7FF88B740000
trusted library allocation
page read and write
270E24CD000
heap
page read and write
7FF88B63E000
trusted library allocation
page read and write
270C9D91000
trusted library allocation
page read and write
7FF88B3C0000
trusted library allocation
page read and write
7FF88B5C0000
trusted library allocation
page read and write
CC9E1F9000
stack
page read and write
270C9ED9000
trusted library allocation
page read and write
7FF88B670000
trusted library allocation
page read and write
CC9DEFE000
stack
page read and write
270CA185000
trusted library allocation
page read and write
7FF88B594000
trusted library allocation
page read and write
CC9E7FA000
stack
page read and write
7FF88B617000
trusted library allocation
page read and write
CC9DFFE000
stack
page read and write
270E3C01000
heap
page read and write
7FF88B550000
trusted library allocation
page read and write
270E2477000
heap
page read and write
7FF88B5F4000
trusted library allocation
page read and write
270C84BC000
heap
page read and write
7FF88B660000
trusted library allocation
page read and write
270C9DDB000
trusted library allocation
page read and write
7FF88B3B2000
trusted library allocation
page read and write
270E3BF0000
heap
page read and write
7FF88B45C000
trusted library allocation
page execute and read and write
270CA123000
trusted library allocation
page read and write
CC9E3FE000
stack
page read and write
7FF88B610000
trusted library allocation
page read and write
270C9D68000
trusted library allocation
page read and write
270E24C9000
heap
page read and write
7FF88B650000
trusted library allocation
page execute and read and write
270C9BB0000
heap
page execute and read and write
270C81D0000
heap
page read and write
270CA298000
trusted library allocation
page read and write
7FF88B3CB000
trusted library allocation
page execute and read and write
7FF88B4C0000
trusted library allocation
page execute and read and write
There are 174 hidden memdumps, click here to show them.