IOC Report
REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Folkedansens\Suffigere\Glaucophane\AsOpenFile.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Folkedansens\Suffigere\Glaucophane\Tusindtallig.Syn
data
dropped
C:\Users\user\AppData\Local\Folkedansens\Suffigere\Glaucophane\prowl.Dgn
data
dropped
C:\Users\user\AppData\Local\Temp\nsq493.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Roaming\5D4ACB\B73EF6.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe
C:\Users\user\Desktop\REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe
malicious
C:\Users\user\Desktop\REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe
C:\Users\user\Desktop\REQUEST FOR OFFER 30-12-2022#U00b7pdf.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7568 -s 1980

URLs

Name
IP
Malicious
http://157.245.36.27/~dokterpol/?page=2874
157.245.36.27
malicious
https://doc-0g-8k-docs.googleusercontent.com/%%doc-0g-8k-docs.googleusercontent.com
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://doc-0g-8k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/65eu063p0f9eoc2qkjfmonuuk5gkqmq4/1669764675000/03238822727237126472/*/1ZppbncXCwboWfcBo0A5zlqzevMjFwzpW?e=download&uuid=c4bc146b-22c6-4e17-89b8-c96a6eb96fab
142.250.185.161
https://drive.google.com/
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
https://doc-0g-8k-docs.googleusercontent.com/)
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
https://doc-0g-8k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/65eu063p
unknown
https://doc-0g-8k-docs.googleusercontent.com/
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.238
googlehosted.l.googleusercontent.com
142.250.185.161
doc-0g-8k-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
157.245.36.27
unknown
United States
malicious
142.250.185.161
googlehosted.l.googleusercontent.com
United States
142.250.185.238
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Procentuelles232\Frafaldsprocents\Forarbejdendes\Inceration
Pythius
HKEY_CURRENT_USER\SOFTWARE\Sammenlgningens\Tjurunga\Pakkeforsendelserne\Thiophthene
Etaper
HKEY_LOCAL_MACHINE\SOFTWARE\Compoundedness
Caballo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bekvemmeligheder
Hovedbibliotekerne

Memdumps

Base Address
Regiontype
Protect
Malicious
7CC000
heap
page read and write
malicious
32D0000
direct allocation
page execute and read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
2510000
trusted library allocation
page read and write
469000
unkown
page readonly
3420000
heap
page read and write
1984000
heap
page read and write
2295000
heap
page read and write
1F117D13000
heap
page read and write
1D49D000
stack
page read and write
401000
unkown
page execute read
1D4A6000
direct allocation
page read and write
400000
unkown
page readonly
1A70000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
5F2000
unkown
page write copy
1930000
heap
page read and write
3560000
trusted library allocation
page read and write
1F117D00000
heap
page read and write
427000
unkown
page read and write
408000
unkown
page readonly
1D50E000
stack
page read and write
1F117A13000
unkown
page read and write
401000
unkown
page execute read
23B0000
heap
page read and write
1981000
heap
page read and write
1F117A02000
unkown
page read and write
3B20000
trusted library allocation
page read and write
2299000
heap
page read and write
1F117B00000
trusted library allocation
page read and write
1D04F000
stack
page read and write
1BF0000
trusted library allocation
page read and write
2564000
heap
page read and write
1C50000
heap
page read and write
1985000
heap
page read and write
1F117D13000
heap
page read and write
1D4A0000
direct allocation
page read and write
1D26D000
stack
page read and write
57E000
stack
page read and write
3421000
heap
page read and write
20000
unclassified section
page readonly
226E000
stack
page read and write
469000
unkown
page readonly
1F117A2A000
heap
page read and write