IOC Report
SecuriteInfo.com.Exploit.Siggen3.32567.15846.18516

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Exploit.Siggen3.32567.15846.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 08:38:10 2022, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\LjSKxP[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\CPZby9k8xhW2TaPgwsAagxTpGuhIkFrK[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\F3DOS06hLF1rUq3s6XOB[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Exploit.Siggen3.32567.15846.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 08:38:10 2022, Security: 0
dropped
malicious
C:\Users\user\uxevr1.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr2.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr4.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\FUVVPG\TGCY.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\JQSPcFGJSVOMPtFX\ZXsHFctgkSbxp.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\VrLOhrB\szFRUu.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Temp\Cab3444.tmp
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\Tar3445.tmp
data
modified
C:\Users\user\AppData\Local\Temp\~DFA61A33ED8C15AF6F.TMP
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JQSPcFGJSVOMPtFX\ZXsHFctgkSbxp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VrLOhrB\szFRUu.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FUVVPG\TGCY.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup

URLs

Name
IP
Malicious
https://173.82.82.196/t5
unknown
malicious
https://173.82.82.196:8080/
unknown
malicious
https://www.melisetotoaksesuar.com/catalog/controller/account/dqfKI/
212.98.224.29
malicious
http://jr-software-web.net/aaabackupsqldb/11hYk3bHJ/
138.219.41.210
malicious
https://173.82.82.196:8080/P5
unknown
malicious
http://elamurray.com/athletics-carnival-2018/3UTZYr9D9f/
66.84.31.11
malicious
https://173.82.82.196/
unknown
malicious
https://173.82.82.196:8080/;j
unknown
malicious
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://ocsp.comodoc
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://secure.comodo.co
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://crl.com
unknown
http://ocsp.entrust.net0D
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jr-software-web.net
138.219.41.210
malicious
elamurray.com
66.84.31.11
masyuk.com
128.199.252.32
melisetotoaksesuar.com
212.98.224.29
www.melisetotoaksesuar.com
unknown

IPs

IP
Domain
Country
Malicious
173.82.82.196
unknown
United States
malicious
138.219.41.210
jr-software-web.net
Argentina
malicious
128.199.252.32
masyuk.com
United Kingdom
212.98.224.29
melisetotoaksesuar.com
Turkey
66.84.31.11
elamurray.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
y#+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6581E
6581E
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
$=+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2D0000
direct allocation
page execute and read and write
malicious
1D0000
direct allocation
page execute and read and write
malicious
4D0000
direct allocation
page execute and read and write
malicious
1E0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
7FEF74E1000
unkown
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1C0000
direct allocation
page execute and read and write
malicious
7FEF74E1000
unkown
page execute read
malicious
180001000
direct allocation
page execute read
malicious
7FEF7505000
unkown
page readonly
2B98000
heap
page read and write
20F5000
heap
page read and write
2245000
heap
page read and write
7FEF91BB000
unkown
page read and write
7FEF91BF000
unkown
page readonly
368E000
heap
page read and write
4C6000
heap
page read and write
1B8000
heap
page read and write
2462000
heap
page read and write
18002D000
direct allocation
page read and write
23AF000
stack
page read and write
2CC3000
heap
page read and write
3E3000
heap
page read and write
2BCF000
heap
page read and write
570000
heap
page read and write
2BEC000
heap
page read and write
256000
heap
page read and write
7FEF9190000
unkown
page readonly
36D000
heap
page read and write
130000
direct allocation
page execute and read and write
4B0000
heap
page read and write
2D1A000
heap
page read and write
2BDA000
heap
page read and write
18002D000
direct allocation
page read and write
5A6000
heap
page read and write
2B0000
heap
page read and write
30E000
heap
page read and write
370000
heap
page read and write
18002C000
direct allocation
page readonly
243000
heap
page read and write
358000
heap
page read and write
75E000
stack
page read and write
324000
heap
page read and write
3A6000
heap
page read and write
7FEF9191000
unkown
page execute read
1BD000
stack
page read and write
10000
heap
page read and write
351000
heap
page read and write
2CE000
heap
page read and write
280000
heap
page read and write
22A0000
heap
page read and write
7FEF74E0000
unkown
page readonly
2BEF000
heap
page read and write
298000
heap
page read and write
2115000
heap
page read and write
214B000
heap
page read and write
303000
heap
page read and write
18002E000
direct allocation
page readonly
276000
heap
page read and write
180000000
direct allocation
page read and write
2C9E000
stack
page read and write
440000
heap
page read and write
2EBF000
stack
page read and write
26DE000
stack
page read and write
291F000
stack
page read and write
2AE000
heap
page read and write
2B7000
heap
page read and write
347000
heap
page read and write
2BCF000
heap
page read and write
21EB000
heap
page read and write
3A6000
heap
page read and write
18002E000
direct allocation
page readonly
213B000
heap
page read and write
100000
heap
page read and write
1B4000
heap
page read and write
520000
trusted library allocation
page read and write
3AB000
heap
page read and write
F8000
stack
page read and write
2110000
heap
page read and write
23AB000
stack
page read and write
2C5000
heap
page read and write
130000
direct allocation
page execute and read and write
2BC8000
heap
page read and write
7FEF91B2000
unkown
page readonly
36D4000
heap
page read and write
35D000
heap
page read and write
33A000
heap
page read and write
1B0000
direct allocation
page execute and read and write
3E6000
heap
page read and write
490000
heap
page read and write
484000
heap
page read and write
138000
stack
page read and write
2E8F000
stack
page read and write
2EE000
heap
page read and write
5C0000
heap
page read and write
2460000
heap
page read and write
232F000
stack
page read and write
2B98000
heap
page read and write
7FEF91B2000
unkown
page readonly
2BCF000
heap
page read and write
2B1D000
heap
page read and write
2BDA000
heap
page read and write
368E000
heap
page read and write
2CE4000
heap
page read and write
2C3000
heap
page read and write
344000
heap
page read and write
2A4000
heap
page read and write
3E6000
heap
page read and write
36D5000
heap
page read and write
18002C000
direct allocation
page readonly
30A000
heap
page read and write
310000
heap
page read and write
528000
heap
page read and write
5F0000
remote allocation
page read and write
6C0000
heap
page read and write
2CBB000
stack
page read and write
389000
heap
page read and write
4B0000
heap
page read and write
39A000
heap
page read and write
2F0000
heap
page read and write
370000
heap
page read and write
290000
heap
page read and write
180000000
direct allocation
page read and write
2CA000
heap
page read and write
302000
heap
page read and write
456000
heap
page read and write
2AFB000
stack
page read and write
7EFE0000
unkown
page readonly
241F000
stack
page read and write
614000
heap
page read and write
564000
heap
page read and write
319000
heap
page read and write
282C000
stack
page read and write
278E000
stack
page read and write
3080000
heap
page read and write
545000
heap
page read and write
2830000
heap
page read and write
33A000
heap
page read and write
2D1F000
stack
page read and write
540000
heap
page read and write
2BCF000
heap
page read and write
2D7E000
stack
page read and write
36D000
heap
page read and write
7C4000
heap
page read and write
23C000
stack
page read and write
340000
heap
page read and write
7FEF74E0000
unkown
page readonly
340000
heap
page read and write
1F7000
heap
page read and write
180000000
direct allocation
page read and write
390000
heap
page read and write
338000
heap
page read and write
32E000
heap
page read and write
2B0000
heap
page read and write
37E000
heap
page read and write
319000
heap
page read and write
4E4000
heap
page read and write
247E000
stack
page read and write
2BDA000
heap
page read and write
7FEF9D20000
unkown
page readonly
18002E000
direct allocation
page readonly
485000
heap
page read and write
54D000
heap
page read and write
3646000
heap
page read and write
1F7000
heap
page read and write
1C0000
direct allocation
page execute and read and write
2BEC000
heap
page read and write
28E000
heap
page read and write
260E000
stack
page read and write
2296000
heap
page read and write
104000
heap
page read and write
21B0000
heap
page read and write
326000
heap
page read and write
6C4000
heap
page read and write
2290000
heap
page read and write
7FEF9D21000
unkown
page execute read
196000
heap
page read and write
18002C000
direct allocation
page readonly
2F0E000
stack
page read and write
7FEF9191000
unkown
page execute read
18002E000
direct allocation
page readonly
7FEF91BF000
unkown
page readonly
1D0000
heap
page read and write
2BDA000
heap
page read and write
360000
heap
page read and write
538000
heap
page read and write
368C000
heap
page read and write
240000
heap
page read and write
10000
heap
page read and write
2B53000
heap
page read and write
2BCA000
heap
page read and write
2295000
heap
page read and write
1D8000
stack
page read and write
7FEF7500000
unkown
page read and write
3CE000
heap
page read and write
2100000
remote allocation
page read and write
1BD000
heap
page read and write
57B000
heap
page read and write
242F000
stack
page read and write
2BD0000
heap
page read and write
2BDB000
heap
page read and write
277000
heap
page read and write
358000
heap
page read and write
2CA000
heap
page read and write
22E000
heap
page read and write
2E4000
heap
page read and write
2DC000
heap
page read and write
42F000
heap
page read and write
2EE000
heap
page read and write
2B40000
heap
page read and write
10000
heap
page read and write
227B000
heap
page read and write
24C0000
heap
page read and write
480000
heap
page read and write
2CE0000
heap
page read and write
7FEF9D4B000
unkown
page read and write
22D000
heap
page read and write
364000
heap
page read and write
52F000
unkown
page read and write
7FEF9D4F000
unkown
page readonly
3B0000
heap
page read and write
227F000
stack
page read and write
2DAF000
stack
page read and write
620000
heap
page read and write
2C00000
heap
page read and write
21FD000
stack
page read and write
250000
heap
page read and write
206000
heap
page read and write
2240000
heap
page read and write
236000
heap
page read and write
2C3000
heap
page read and write
18002D000
direct allocation
page read and write
351000
heap
page read and write
4C0000
direct allocation
page execute and read and write
310000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2BCF000
heap
page read and write
2BC5000
heap
page read and write
2CE0000
heap
page read and write
24C2000
heap
page read and write
2AE000
heap
page read and write
1BC000
stack
page read and write
2100000
remote allocation
page read and write
1F0000
heap
page read and write
624000
heap
page read and write
1C8000
stack
page read and write
4E6000
heap
page read and write
10000
heap
page read and write
22CB000
heap
page read and write
7FEF9D21000
unkown
page execute read
7FEF7505000
unkown
page readonly
18002C000
direct allocation
page readonly
303000
heap
page read and write
10000
heap
page read and write
35D000
heap
page read and write
7FEF74F7000
unkown
page readonly
560000
heap
page read and write
444000
heap
page read and write
18002D000
direct allocation
page read and write
2B00000
heap
page read and write
277000
heap
page read and write
200000
heap
page read and write
2100000
heap
page read and write
180000000
direct allocation
page read and write
340000
heap
page read and write
2BEA000
heap
page read and write
2260000
heap
page read and write
27B000
heap
page read and write
2BDA000
heap
page read and write
A8000
stack
page read and write
310000
heap
page read and write
7FEF9D4B000
unkown
page read and write
10000
heap
page read and write
7FEF9190000
unkown
page readonly
2FB0000
heap
page read and write
2B62000
heap
page read and write
2610000
heap
page read and write
20F0000
heap
page read and write
2105000
heap
page read and write
3EA000
heap
page read and write
357000
heap
page read and write
21AF000
stack
page read and write
5C4000
heap
page read and write
7FEF7500000
unkown
page read and write
2EC000
heap
page read and write
2240000
heap
page read and write
24A000
heap
page read and write
2B9A000
heap
page read and write
212B000
heap
page read and write
610000
heap
page read and write
20B0000
heap
page read and write
2CC0000
heap
page read and write
414000
heap
page read and write
36D5000
heap
page read and write
340000
heap
page read and write
7FEF91BB000
unkown
page read and write
1A8000
heap
page read and write
302000
heap
page read and write
20E6000
heap
page read and write
23B000
heap
page read and write
198000
heap
page read and write
18002C000
direct allocation
page readonly
28E0000
heap
page read and write
3B0000
heap
page read and write
4E0000
heap
page read and write
2C2C000
stack
page read and write
2FE000
heap
page read and write
2B7000
heap
page read and write
7FEF74F7000
unkown
page readonly
424000
heap
page read and write
2BEC000
heap
page read and write
4F0000
heap
page read and write
358000
heap
page read and write
18002D000
direct allocation
page read and write
10000
heap
page read and write
393000
heap
page read and write
30C000
heap
page read and write
397000
heap
page read and write
29C0000
heap
page read and write
270000
heap
page read and write
338000
heap
page read and write
7C0000
heap
page read and write
362000
heap
page read and write
410000
heap
page read and write
2BB9000
heap
page read and write
36B4000
heap
page read and write
1F0000
heap
page read and write
2BDA000
heap
page read and write
21BD000
stack
page read and write
10000
heap
page read and write
2BDA000
heap
page read and write
526000
heap
page read and write
2A0000
heap
page read and write
21B5000
heap
page read and write
2456000
heap
page read and write
2BEA000
heap
page read and write
18002E000
direct allocation
page readonly
AAF000
stack
page read and write
7FEF9D42000
unkown
page readonly
29C0000
heap
page read and write
7FEF9D4F000
unkown
page readonly
2B0E000
heap
page read and write
27AD000
stack
page read and write
29C4000
heap
page read and write
5F0000
remote allocation
page read and write
2B51000
heap
page read and write
350000
heap
page read and write
7FEF9D20000
unkown
page readonly
2BC5000
heap
page read and write
2CDC000
stack
page read and write
4E6000
heap
page read and write
361F000
heap
page read and write
3611000
heap
page read and write
3610000
heap
page read and write
30A000
heap
page read and write
386000
heap
page read and write
270000
heap
page read and write
2450000
heap
page read and write
2D1C000
heap
page read and write
2B4000
heap
page read and write
30E000
heap
page read and write
1B0000
heap
page read and write
204000
heap
page read and write
2BEF000
heap
page read and write
548000
heap
page read and write
7FEF9D42000
unkown
page readonly
160000
heap
page read and write
2BC5000
heap
page read and write
2C1F000
stack
page read and write
476000
heap
page read and write
321000
heap
page read and write
There are 364 hidden memdumps, click here to show them.