IOCReport

loading gif

Files

File Path
Type
Category
Malicious
PO 2010029_pdf Quotation from Alibaba Ale.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsUpdate.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\c7156b3839fe4b43a6263c28516d097c.xml
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\folder\file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_I3UYUDMLOPVYGRAZ_ff5d37c08782585231182226e219de1bf556ec8_00000000_12aa1aeb\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9679.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9745.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
dropped
clean
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
clean
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped
clean
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO 2010029_pdf Quotation from Alibaba Ale.exe
'C:\Users\user\Desktop\PO 2010029_pdf Quotation from Alibaba Ale.exe'
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Create /TN file /XML 'C:\Users\user\AppData\Local\Temp\c7156b3839fe4b43a6263c28516d097c.xml'
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
'C:\Users\user\AppData\Roaming\WindowsUpdate.exe'
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
'C:\Users\user\AppData\Roaming\WindowsUpdate.exe'
malicious
C:\Windows\SysWOW64\cmd.exe
'C:\Windows\System32\cmd.exe' /c schtasks /Create /TN file /XML 'C:\Users\user\AppData\Local\Temp\c7156b3839fe4b43a6263c28516d097c.xml'
clean
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
clean
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 2532
clean

URLs

Name
IP
Malicious
http://www.carterandcone.comsig
unknown
clean
http://www.jiyu-kobo.co.jp/.kL
unknown
clean
http://www.fontbureau.com/designersG
unknown
clean
http://www.jiyu-kobo.co.jp/yk?
unknown
clean
http://www.fontbureau.com/designers/?
unknown
clean
http://www.founder.com.cn/cn/bThe
unknown
clean
http://foo.com/fooT
unknown
clean
http://www.fontbureau.com/designers?
unknown
clean
http://www.jiyu-kobo.co.jp/el-g
unknown
clean
http://www.tiro.com
unknown
clean
http://www.carterandcone.com6
unknown
clean
http://www.fontbureau.com/designers
unknown
clean
http://www.goodfont.co.kr
unknown
clean
http://www.carterandcone.com
unknown
clean
http://www.sajatypeworks.com
unknown
clean
http://www.typography.netD
unknown
clean
http://www.founder.com.cn/cn/cThe
unknown
clean
http://www.jiyu-kobo.co.jp/jp/.kL
unknown
clean
http://www.galapagosdesign.com/staff/dennis.htm
unknown
clean
http://fontfabrik.com
unknown
clean
http://www.jiyu-kobo.co.jp/%k
unknown
clean
http://www.jiyu-kobo.co.jp/jp/%k
unknown
clean
http://whatismyipaddress.com/-
unknown
clean
http://www.galapagosdesign.com/DPlease
unknown
clean
http://www.fontbureau.comgrito
unknown
clean
http://www.ascendercorp.com/typedesigners.html
unknown
clean
https://login.yahoo.com/config/login
unknown
clean
http://www.fonts.com
unknown
clean
http://www.jiyu-kobo.co.jp/pk
unknown
clean
http://www.sandoll.co.kr
unknown
clean
http://www.urwpp.deDPlease
unknown
clean
http://whatismyipaddress.com/
104.16.155.36
clean
http://www.nirsoft.net/
unknown
clean
http://www.zhongyicts.com.cn
unknown
clean
http://www.sakkal.com
unknown
clean
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
clean
http://www.apache.org/licenses/LICENSE-2.0
unknown