IOC Report
MACHINE SPECIFICATIONS.exe

loading gif

Files

File Path
Type
Category
Malicious
MACHINE SPECIFICATIONS.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MACHINE SPECIFICATIONS.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\newapp\newapp.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newapp.exe.log
ASCII text, with CRLF line terminators
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
malicious
C:\Users\user\AppData\Roaming\newapp\newapp.exe
"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
malicious
C:\Users\user\AppData\Roaming\newapp\newapp.exe
"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
3.220.57.224
http://127.0.0.1:HTTP/1.1
unknown
https://api.ipify.org
unknown
https://eyUBHCqVhczCNfHAY6U.org
unknown
http://xgrPBN.com
unknown
http://ftp.electrobist.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.ipify.orgftp://ftp.electrobist.comuser1
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown

Domains

Name
IP
Malicious
ftp.electrobist.com
51.195.62.160
malicious
api.ipify.org.herokudns.com
3.220.57.224
c-0001.c-msedge.net
13.107.4.50
api.ipify.org
unknown

IPs

IP
Domain
Country
Malicious
51.195.62.160
ftp.electrobist.com
France
malicious
192.168.2.1
unknown
unknown
3.220.57.224
api.ipify.org.herokudns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CasPol_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
newapp
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
newapp
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28D4000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
5DF0000
trusted library allocation
page read and write
D1DBCFC000
stack
page read and write
19218460000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
192183E0000
trusted library allocation
page read and write
192183D0000
trusted library allocation
page read and write
1942E660000
heap
page read and write
AFE957E000
stack
page read and write
5E80000
trusted library allocation
page read and write
1DD48C10000
heap
page read and write
DD651FE000
stack
page read and write
110B000
trusted library allocation
page execute and read and write
5DF0000
trusted library allocation
page read and write
6348000
trusted library allocation
page read and write
11CE000
stack
page read and write
5E80000
trusted library allocation
page read and write
19232530000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
498A000
trusted library allocation
page read and write
19232510000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
192183D0000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
2754243D000
heap
page read and write
2442C0F1000
heap
page read and write
5E80000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
C90000
heap
page read and write
5EC0000
trusted library allocation
page read and write
19232670000
trusted library allocation
page read and write
192183D0000
trusted library allocation
page read and write
2053F118000
heap
page read and write