IOC Report
Lakeringernes (1).exe

loading gif

Files

File Path
Type
Category
Malicious
Lakeringernes (1).exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Distressingly\Bloods\Ultraevangelical\Graviton\Kvle\Materialiseringerne\Antenneanlgget\Custom3.ini
Generic INItialization configuration [Effect2]
dropped
C:\Users\user\AppData\Local\Temp\Distressingly\Bloods\Ultraevangelical\Graviton\Kvle\Materialiseringerne\Antenneanlgget\Invirility.Hus
data
dropped
C:\Users\user\AppData\Local\Temp\Distressingly\Bloods\Ultraevangelical\histopathologist.Clo
data
dropped
C:\Users\user\AppData\Local\Temp\Dybfrossen.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nst187.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lakeringernes (1).exe
C:\Users\user\Desktop\Lakeringernes (1).exe
malicious

URLs

Name
IP
Malicious
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://www.certum.pl/CPS0
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
There are 2 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Strikketjet
Trafikable
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Produktionsmodel\Mandilion
tilsynskapitlernes

Memdumps

Base Address
Regiontype
Protect
Malicious
3260000
direct allocation
page execute and read and write
malicious
64B000
heap
page read and write
malicious
401000
unkown
page execute read
1B52E1C0000
trusted library allocation
page read and write
10005000
unkown
page readonly
20C0000
heap
page read and write
3130000
trusted library allocation
page read and write
2214000
heap
page read and write
2764000
trusted library allocation
page read and write
2764000
trusted library allocation
page read and write
1B52E1F0000
trusted library allocation
page read and write
409000
unkown
page write copy
1B52E140000
heap
page read and write
1B52E120000
heap
page read and write
21F0000
trusted library allocation
page read and write
407000
unkown
page readonly
409000
unkown
page read and write
43B000
unkown
page readonly
210E000
stack
page read and write
550000
trusted library allocation
page read and write
1B52E1D0000
trusted library allocation
page read and write
1B52E24D000
heap
page read and write
9946DF9000
stack
page read and write
219E000
stack
page read and write
30000
heap
page read and write
1B52E246000
heap
page read and write
1B52E208000
heap
page read and write
2210000
heap
page read and write
1B52DFF0000
trusted library allocation
page read and write
1B52E247000
heap
page read and write
1B52F090000
trusted library allocation
page read and write
10003000
unkown
page readonly
1B52DFE0000
heap
page read and write
400000
unkown
page readonly
10001000
unkown
page execute read
1B52E1B0000
trusted library allocation
page read and write
401000
unkown
page execute read
1B52E266000
heap
page read and write
590000
heap
page read and write
19A000
stack
page read and write
97000
stack
page read and write
43A000
unkown
page read and write
43B000
unkown
page readonly
638000
heap
page read and write
1B52F0F0000
trusted library allocation
page read and write
1B52E4C9000
heap
page read and write
407000
unkown
page readonly
429000
unkown
page read and write
600000
heap
page read and write
1B52E200000
heap
page read and write
1B52E24E000
heap
page read and write
9946EFE000
stack
page read and write
9946E79000
stack
page read and write
1B52E4C0000
heap
page read and write
1B52E4C5000
heap
page read and write
2764000
trusted library allocation
page read and write
275F000
stack
page read and write
2200000
trusted library allocation
page read and write
421000
unkown
page read and write
436000
unkown
page read and write
1B52E210000
heap
page read and write
1B52F0A0000
trusted library allocation
page read and write
2150000
heap
page read and write
1B52E4D0000
trusted library allocation
page read and write
1B52E4B0000
heap
page readonly
9946FF9000
stack
page read and write
641000
heap
page read and write
1B52E26B000
heap
page read and write
10000000
unkown
page readonly
20C6000
heap
page read and write
1B52EE80000
trusted library allocation
page read and write
265F000
stack
page read and write
9946C7B000
stack
page read and write
400000
unkown
page readonly
425000
unkown
page read and write
607000
heap
page read and write
9946F7A000
stack
page read and write
1B52E24D000
heap
page read and write
2762000
trusted library allocation
page read and write
There are 69 hidden memdumps, click here to show them.