IOC Report
diatomaceous.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\diatomaceous.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\diatomaceous.dat.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
809e178a
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
82df37f6
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
3a635093
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
476b1f19
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ffd7787c
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
382270ef
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
ca48a832
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
b501c7c4

Memdumps

Base Address
Regiontype
Protect
Malicious
2520000
system
page execute and read and write
malicious
3000000
trusted library allocation
page read and write
malicious
4960000
trusted library allocation
page read and write
malicious
2BC0000
trusted library allocation
page execute and read and write
malicious
2B70000
trusted library allocation
page read and write
malicious
2520000
system
page execute and read and write
malicious
2BC0000
system
page execute and read and write
malicious
4AD0000
trusted library allocation
page execute and read and write
malicious
4AF0000
trusted library allocation
page execute and read and write
malicious
2580000
system
page execute and read and write
malicious
2580000
system
page execute and read and write
malicious
4C41000
heap
page read and write
6DAA6000
unkown
page readonly
4A35000
trusted library allocation
page read and write
4C16000
heap
page read and write
4460000
trusted library allocation
page read and write
6CB000
heap
page read and write
4A9F000
stack
page read and write
2DF0000
trusted library allocation
page read and write
2B90000
unkown
page readonly
2500000
unkown
page readonly
4C25000
heap
page read and write
2B6F000
stack
page read and write
26AE66C0000
heap
page readonly
43DF000
heap
page read and write
4A2E000
trusted library allocation
page read and write
4C25000
heap
page read and write
B1F000
stack
page read and write
6DA51000
unkown
page execute read
25B0000
remote allocation
page read and write
4BA0000
heap
page read and write
ABC000
stack
page read and write
2BA0000
unkown
page readonly
2550000
unkown
page readonly
4860000
heap
page read and write
2500000
unkown
page readonly
4EB0000
trusted library allocation
page read and write
B60000
heap
page read and write
A84000
heap
page read and write
4A20000
trusted library allocation
page read and write
4F31000
heap
page read and write
24AC000
stack
page read and write
26AE6730000
trusted library allocation
page read and write
4C1F000
heap
page read and write
2BA0000
unkown
page readonly
4CA0000
heap
page read and write
4A1F000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
2570000
unkown
page read and write
597A000
trusted library allocation
page read and write
4BF1000
heap
page read and write
4C0F000
heap
page read and write
4A31000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
4A1F000
trusted library allocation
page read and write
24F0000
unkown
page readonly
690000
heap
page read and write
4F31000
heap
page read and write
26AE571C000
heap
page read and write
4EB0000
trusted library allocation
page read and write