IOC Report
BPL_1000572_007.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
BPL_1000572_007.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BPL_1000572_007.bat.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\Wthdlxoyqvnqsfcfiinf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fireless.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\note\pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\note\pdf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Wthdlxoyqvnqsfcf_ec9af89a7aba5095a1b9163a261854dde92db_1f43b382_1621c52a\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A92.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Sep 23 15:01:48 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA781.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9A5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4mju5by.ked.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w45iylbi.unn.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\A1EB3E3549D5FF0555D7\LoghemosideroticdJPxvxBPhxRvFDWcDVPhPZaUIGIDQLVJwWmvfjYBsLDUhypometropia
SQLite 3.x database, last written using SQLite version 3038005
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BPL_1000572_007.bat.exe
"C:\Users\user\Desktop\BPL_1000572_007.bat.exe"
malicious
C:\Users\user\AppData\Local\Temp\Wthdlxoyqvnqsfcfiinf.exe
"C:\Users\user\AppData\Local\Temp\Wthdlxoyqvnqsfcfiinf.exe"
malicious
C:\Users\user\Desktop\BPL_1000572_007.bat.exe
C:\Users\user\Desktop\BPL_1000572_007.bat.exe
malicious
C:\Users\user\AppData\Roaming\note\pdf.exe
"C:\Users\user\AppData\Roaming\note\pdf.exe"
malicious
C:\Users\user\AppData\Roaming\note\pdf.exe
"C:\Users\user\AppData\Roaming\note\pdf.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fireless.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fireless.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 1352

URLs

Name
IP
Malicious
http://185.252.178.63/loader/uploads/inf_Hpgwbzkt.bmp
185.252.178.63
malicious
http://185.252.178.63/loader/uploads/Arwiw_Xnqfdlpv.png
185.252.178.63
malicious
http://showip.netxhttp://www.mediacollege.com/internet/utilities/show-ip.shtml__vbaLsetFixstr__vbaFi
unknown
http://185.252.178.63/loader/uploads/Arwiw_Xnqfdlpv.pngP/r/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.252.178.63/loader/uploads/inf_Hpgwbzkt.bmp)Acugwsmmzufefycomfxvihl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://showip.net/
unknown
http://185.252.178.63
unknown
https://unpkg.com/leaflet
unknown
https://search.yahoo.com?fr=crmas_sfpf
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.newtonsoft.com/json
unknown
http://upx.sf.net
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://showip.net/?checkip=
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
http://showip.net/
162.55.60.2
http://james.newtonking.com/projects/json
unknown
https://api.telegram.org/bot4(SpawnProcess)
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
http://schema.org
unknown
https://www.openstreetmap.org/copyright
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown