IOCReport

loading gif

Files

File Path
Type
Category
Malicious
RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\xzvghsC.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Cshgvzx\\Cshgvzx.exe">), ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Cshgvzxpdvyucjurgvmywubhtofxefb[1]
data
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\Cshgvzxpdvyucjurgvmywubhtofxefb[2]
data
dropped
clean

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
'C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe'
malicious
C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
malicious
C:\Windows\SysWOW64\mobsync.exe
C:\Windows\System32\mobsync.exe
malicious
C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe
'C:\Users\Public\Libraries\Cshgvzx\Cshgvzx.exe'
malicious
C:\Windows\SysWOW64\dialer.exe
C:\Windows\System32\dialer.exe
malicious
C:\Windows\SysWOW64\secinit.exe
C:\Windows\System32\secinit.exe
malicious

URLs

Name
IP
Malicious
204.44.86.179
malicious

Domains

Name
IP
Malicious
cdn.discordapp.com
162.159.135.233
clean

IPs

IP
Domain
Country
Malicious
204.44.86.179
unknown
United States
malicious
192.168.2.1
unknown
unknown
clean
162.159.135.233
cdn.discordapp.com
United States
clean

Registry

Path
Value
Malicious
C:\Users\user\Desktop\RFQ-Order_Sheet#43254363-Sept-21_signed-copy.exe
Cshgvzx
clean
C:\Windows\SysWOW64\mobsync.exe
exepath
clean
C:\Windows\SysWOW64\mobsync.exe
licence
clean

Memdumps

Base Address
Regiontype
Protect
Malicious
30E7000
heap default
page read and write
malicious
2F98000
heap default
page read and write
malicious
500000
unkown
page execute and read and write
malicious
10590000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
6E8000
heap default
page read and write
malicious
10590000
unkown
page execute and read and write
malicious
10590000
unkown
page execute and read and write
malicious
1040000
unkown
page read and write
clean
10590000
unkown
page execute and read and write
clean
3F24000
unkown
page read and write
clean
3D30000
unkown
page read and write
clean
2448000
unkown
page read and write
clean
21CC000
unkown
page read and write
clean
3F44000
unkown
page read and write
clean
24C8000
unkown
page read and write
clean
2468000
unkown
page read and write
clean
24A0000
unkown
page read and write
clean
8EE000
unkown
page read and write
clean
3D60000
unkown
page read and write
clean
6E0000
heap default
page read and write
clean
11CF27F000
unkown
page read and write
clean
3D30000
unkown
page read and write
clean
2B528990000
unkown
page read and write
clean
3220000
heap default
page read and write
clean
3ED8000
unkown
page read and write
clean
401000
unkown image
page execute read
clean
3DB0000
unkown
page read and write
clean
128ECA90000
unkown
page read and write
clean
D20000
unkown
page execute and read and write
clean
243C000
unkown
page read and write
clean
21C0000
unkown
page read and write
clean
3EA8000
unkown
page read and write
clean
3ED8000
unkown
page read and write
clean
3F08000
unkown
page read and write
clean
3FE8000
unkown
page read and write
clean
4044000
unkown
page read and write
clean
3EF8000
unkown
page read and write
clean
36E0000
unkown
page read and write
clean
3FE8000
unkown
page read and write
clean
128EB725000
unkown
page read and write
clean
30E7000
heap default
page read and write
clean
21E0000
unkown
page read and write