IOC Report
qd_34768.xlsm

loading gif

Files

File Path
Type
Category
Malicious
qd_34768.xlsm
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\eVzUZ7dv5zBAXa5[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\~$qd_34768.xlsm
data
dropped
malicious
C:\Users\user\xewn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 60992 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F230AC8.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 2159x57, frames 3
dropped
C:\Users\user\AppData\Local\Temp\Cab3198.tmp
Microsoft Cabinet archive data, 60992 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\Tar3199.tmp
data
modified
C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd"
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn"
malicious

URLs

Name
IP
Malicious
http://eles-tech.com/css/KzMysMqFMs/
185.46.40.47
malicious
https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnurar
unknown
malicious
https://68.183.94.239/
unknown
malicious
https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnural
unknown
malicious
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net0D
unknown
http://ocsp.entrust.net03
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eles-tech.com
185.46.40.47
malicious

IPs

IP
Domain
Country
Malicious
68.183.94.239
unknown
United States
malicious
185.46.40.47
eles-tech.com
Turkey
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
<2'
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\327AC
327AC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
?j'
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
231000
direct allocation
page execute read
malicious
250000
direct allocation
page execute and read and write
malicious
401000
direct allocation
page execute read
malicious
180000
direct allocation
page execute and read and write
malicious
1E0000
direct allocation
page execute and read and write
malicious
3C1000
direct allocation
page execute read
malicious
7A4000
trusted library allocation
page read and write
2C5E000
stack
page read and write
10096000
unkown
page read and write
10069000
unkown
page execute read
2B7D000
stack
page read and write
31D1000
trusted library allocation
page read and write
10052000
unkown
page execute read
31D9000
trusted library allocation
page read and write
270F000
stack
page read and write
3210000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
10069000
unkown
page execute read
1008F000
unkown
page read and write
232E000
stack
page read and write
10092000
unkown
page read and write
873E000
trusted library allocation
page read and write
10084000
unkown
page readonly
2730000
heap
page read and write
351D000
trusted library allocation
page read and write
3C0000
direct allocation
page read and write
12A000
stack
page read and write
8CE000
stack
page read and write
1008E000
unkown
page write copy
10091000
unkown
page write copy
31D9000
trusted library allocation
page read and write
10084000
unkown
page readonly
380000
heap
page read and write
100D0000
unkown
page readonly
10001000
unkown
page execute read
31CF000
trusted library allocation
page read and write
2C6D000
stack
page read and write
31AB000
trusted library allocation
page read and write
1009A000
unkown
page write copy
8F4000
heap
page read and write
1D0000
heap
page read and write
31CA000
trusted library allocation
page read and write
10091000
unkown
page write copy
2CDD000
stack
page read and write
3210000
trusted library allocation
page read and write
10062000
unkown
page execute read
2770000
heap
page read and write
351D000
trusted library allocation
page read and write
10000000
unkown
page readonly
2EC0000
heap
page read and write
31CD000
trusted library allocation
page read and write
24F000
heap
page read and write
31FF000
trusted library allocation
page read and write
C0000
heap
page read and write
3E3000
direct allocation
page read and write
31FF000
trusted library allocation
page read and write
10098000
unkown
page read and write
350000
heap
page read and write
10001000
unkown
page execute read
290E000
stack
page read and write
2BDE000
stack
page read and write
1008E000
unkown
page write copy
2780000
trusted library allocation
page read and write
10098000
unkown
page read and write
31FF000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
10098000
unkown
page read and write
283000
heap
page read and write
25C0000
trusted library allocation
page read and write
1008F000
unkown
page read and write
10094000
unkown
page read and write
1007A000
unkown
page readonly
1004C000
unkown
page execute read
10036000
unkown
page execute read
2CAC000
stack
page read and write
31D1000
trusted library allocation
page read and write
930000
heap
page read and write
10036000
unkown
page execute read
100D0000
unkown
page readonly
10000000
unkown
page readonly
253000
direct allocation
page read and write
770000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
23B4000
heap
page read and write
D80000
heap
page read and write
2330000
heap
page read and write
2E3E000
stack
page read and write
10000000
unkown
page readonly
278E000
stack
page read and write
10084000
unkown
page readonly
77D000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
230000
direct allocation
page read and write
430000
heap
page read and write
10092000
unkown
page read and write
10092000
unkown
page read and write
3A2000
heap
page read and write
320D000
trusted library allocation
page read and write
D74000
heap
page read and write
2C8000
heap
page read and write
34F7000
trusted library allocation
page read and write
1006C000
unkown
page execute read
423000
direct allocation
page read and write
1006C000
unkown
page execute read
31D1000
trusted library allocation
page read and write
357000
heap
page read and write
1005C000
unkown
page execute read
8EE000
stack
page read and write
2D5E000
stack
page read and write
38F000
heap
page read and write
374000
heap
page read and write
1004C000
unkown
page execute read
3F0000
heap
page read and write
24A000
heap
page read and write
31CF000
trusted library allocation
page read and write
8F0000
heap
page read and write
1007A000
unkown
page readonly
41A000
heap
page read and write
352E000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
10094000
unkown
page read and write
234000
heap
page read and write
410000
heap
page read and write
31CF000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
2E6000
heap
page read and write
1009C000
unkown
page readonly
2C2E000
stack
page read and write
10062000
unkown
page execute read
2740000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
23D2000
heap
page read and write
860000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
10096000
unkown
page read and write
217000
heap
page read and write
1009C000
unkown
page readonly
2DEE000
stack
page read and write
3210000
trusted library allocation
page read and write
252000
direct allocation
page read and write
CA000
stack
page read and write
319F000
trusted library allocation
page read and write
2CBE000
stack
page read and write
3210000
trusted library allocation
page read and write
10000
heap
page read and write
10036000
unkown
page execute read
2F3000
heap
page read and write
27E0000
trusted library allocation
page read and write
2B8E000
stack
page read and write
2734000
heap
page read and write
31CD000
trusted library allocation
page read and write
2ED2000
heap
page read and write
149000
stack
page read and write
912000
heap
page read and write
2DAE000
stack
page read and write
33F000
stack
page read and write
10001000
unkown
page execute read
34F7000
trusted library allocation
page read and write
D7E000
stack
page read and write
280000
heap
page read and write
2DEE000
stack
page read and write
10096000
unkown
page read and write
3210000
trusted library allocation
page read and write
1005C000
unkown
page execute read
31D9000
trusted library allocation
page read and write
287000
heap
page read and write
2D4D000
stack
page read and write
10062000
unkown
page execute read
C50000
direct allocation
page read and write
160000
heap
page read and write
285000
heap
page read and write
22A000
stack
page read and write
2B9000
heap
page read and write
2A4000
heap
page read and write
31D9000
trusted library allocation
page read and write
21D0000
direct allocation
page read and write
31FF000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
1009A000
unkown
page write copy
869E000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
1006C000
unkown
page execute read
1D6000
heap
page read and write
31D2000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
2730000
heap
page read and write
10052000
unkown
page execute read
239C000
stack
page read and write
1005C000
unkown
page execute read
10000
heap
page read and write
1009C000
unkown
page readonly
3212000
trusted library allocation
page read and write
2A5000
heap
page read and write
10052000
unkown
page execute read
27CE000
stack
page read and write
3DA000
heap
page read and write
740000
trusted library allocation
page read and write
DA4000
heap
page read and write
31D9000
trusted library allocation
page read and write
400000
direct allocation
page read and write
86DE000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
2BA000
heap
page read and write
860000
heap
page read and write
24A000
stack
page read and write
2720000
remote allocation
page read and write
31D1000
trusted library allocation
page read and write
354000
heap
page read and write
384000
heap
page read and write
32C0000
heap
page read and write
31CF000
trusted library allocation
page read and write
2BF000
heap
page read and write
2D9E000
stack
page read and write
31D9000
trusted library allocation
page read and write
78D000
trusted library allocation
page read and write
2720000
remote allocation
page read and write
31FF000
trusted library allocation
page read and write
436000
heap
page read and write
78F000
trusted library allocation
page read and write
2BCE000
stack
page read and write
1008F000
unkown
page read and write
8E0000
heap
page read and write
10000
heap
page read and write
10094000
unkown
page read and write
1007A000
unkown
page readonly
3E2000
direct allocation
page read and write
20B000
stack
page read and write
285F000
stack
page read and write
31CD000
trusted library allocation
page read and write
2CFE000
stack
page read and write
3490000
heap
page read and write
286F000
stack
page read and write
30FC000
stack
page read and write
31D9000
trusted library allocation
page read and write
25C0000
direct allocation
page read and write
D70000
heap
page read and write
79F000
trusted library allocation
page read and write
34F6000
trusted library allocation
page read and write
27A0000
heap
page read and write
10069000
unkown
page execute read
38A000
heap
page read and write
380000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
2C9C000
stack
page read and write
1009A000
unkown
page write copy
3C5000
heap
page read and write
760000
trusted library allocation
page read and write
2DEE000
stack
page read and write
3210000
trusted library allocation
page read and write
422000
direct allocation
page read and write
3180000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
DA0000
heap
page read and write
31FF000
trusted library allocation
page read and write
75D000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
100D0000
unkown
page readonly
3C3000
heap
page read and write
10091000
unkown
page write copy
416000
heap
page read and write
2F8E000
stack
page read and write
23B0000
heap
page read and write
31CD000
trusted library allocation
page read and write
280000
heap
page read and write
CD0000
trusted library allocation
page read and write
210000
heap
page read and write
30A000
heap
page read and write
31CD000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
89E000
stack
page read and write
3229000
trusted library allocation
page read and write
270D000
stack
page read and write
311000
heap
page read and write
2F5000
heap
page read and write
1008E000
unkown
page write copy
1004C000
unkown
page execute read
There are 273 hidden memdumps, click here to show them.