IOC Report
q3oUuJIXkc.exe

loading gif

Files

File Path
Type
Category
Malicious
q3oUuJIXkc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\q3oUuJIXkc.exe
C:\Users\user\Desktop\q3oUuJIXkc.exe
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
"C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:R" /E
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
85.209.135.109/jg94cVd30f/index.php
malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://85.209.135.109/jg94cVd30f/index.phpj
unknown
https://sectigo.com/CPS0
unknown
http://85.209.135.109/jg94cVd30f/index.php
unknown
http://ocsp.sectigo.com0
unknown
http://85.209.135.109/jg94cVd30f/index.phpF
unknown
http://85.209.135.109/jg94cVd30f/index.php?scr=1
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://85.209.135.109/jg94cVd30f/index.phpb
unknown
http://85.209.135.109/jg94cVd30f/index.php58e5d3
unknown
http://85.209.135.109/jg94cVd30f/index.phpd3
unknown
http://85.209.135.109/jg94cVd30f/index.phpz
unknown
http://85.209.135.109/jg94cVd30f/index.phpv
unknown
http://85.209.135.109/jg94cVd30f/index.phpR
unknown
http://85.209.135.109/jg94cVd30f/index.php0
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.209.135.109
unknown
Germany
malicious
192.168.2.4
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
71000
unkown
page execute read
malicious
1281000
unkown
page execute read
malicious
EAD000
heap
page read and write
malicious
34D0000
trusted library allocation
page read and write
CD4000
heap
page read and write
857000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
CB7000
heap
page read and write
11C4000
heap
page read and write
52E5000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write