Analysis Overview
SHA256
2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467
Threat Level: Known bad
The file 2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467 was found to be: Known bad.
Malicious Activity Summary
CryptBot
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Blocklisted process makes network request
Executes dropped EXE
Reads user/profile data of web browsers
Checks BIOS information in registry
Identifies Wine through registry keys
Loads dropped DLL
Looks up external IP address via web service
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Program Files directory
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Checks processor information in registry
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-06-21 19:28
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-06-21 19:28
Reported
2022-06-21 19:31
Platform
win7-20220414-en
Max time kernel
149s
Max time network
171s
Command Line
Signatures
CryptBot
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\Ivp\bin\Two.vbs | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
| File created | C:\Program Files (x86)\Ivp\bin\setup.exe | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
| File created | C:\Program Files (x86)\Ivp\bin\looo.exe | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe
"C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe"
C:\Program Files (x86)\Ivp\bin\setup.exe
"C:\Program Files (x86)\Ivp\bin\setup.exe"
C:\Windows\SysWOW64\CScript.exe
"C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\Ivp\bin\Two.vbs" //e:vbscript //B //NOLOGO
C:\Program Files (x86)\Ivp\bin\looo.exe
"C:\Program Files (x86)\Ivp\bin\looo.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | iplogger.org | udp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | jload05.xyz | udp |
Files
memory/1720-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
\Users\Admin\AppData\Local\Temp\nso3507.tmp\UAC.dll
| MD5 | adb29e6b186daa765dc750128649b63d |
| SHA1 | 160cbdc4cb0ac2c142d361df138c537aa7e708c9 |
| SHA256 | 2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08 |
| SHA512 | b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada |
\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
memory/1904-57-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
\Users\Admin\AppData\Local\Temp\nso3507.tmp\nsExec.dll
| MD5 | 132e6153717a7f9710dcea4536f364cd |
| SHA1 | e39bc82c7602e6dd0797115c2bd12e872a5fb2ab |
| SHA256 | d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2 |
| SHA512 | 9aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1 |
\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
C:\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
memory/1228-64-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\Two.vbs
| MD5 | c6362e3c5585f24a9e9a2712c00c52ff |
| SHA1 | 9259b9609313386f004328d2c306820eae01a587 |
| SHA256 | 184ca5b2737175e0828f3546d483778c95e23720f1375deac0090c2fe415e208 |
| SHA512 | 59ac94fdb6f41d6dc5cbea1855897759f35032ac922b936a0b39a21b6aafb0c862c5d419afa31c0b81f106f2ce06b2909cdb5fb713534fbe36202c5a4fedfeaa |
memory/1720-67-0x0000000002730000-0x0000000002C50000-memory.dmp
memory/1904-68-0x0000000000190000-0x00000000006B0000-memory.dmp
memory/1904-70-0x0000000077700000-0x0000000077880000-memory.dmp
memory/1904-69-0x0000000000FC0000-0x00000000014E0000-memory.dmp
memory/1904-71-0x0000000000190000-0x00000000006B0000-memory.dmp
memory/1904-72-0x0000000073EA1000-0x0000000073EA3000-memory.dmp
memory/1904-73-0x00000000739A1000-0x00000000739A3000-memory.dmp
memory/1904-76-0x0000000073E51000-0x0000000073E53000-memory.dmp
memory/1904-78-0x0000000074501000-0x0000000074503000-memory.dmp
\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
memory/320-80-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
C:\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
memory/1720-86-0x00000000027B0000-0x0000000002CDE000-memory.dmp
memory/320-87-0x0000000000400000-0x000000000092E000-memory.dmp
memory/320-89-0x0000000001400000-0x000000000192E000-memory.dmp
memory/1904-88-0x0000000074361000-0x0000000074363000-memory.dmp
memory/320-90-0x0000000001400000-0x000000000192E000-memory.dmp
memory/320-91-0x0000000000400000-0x000000000092E000-memory.dmp
memory/1904-92-0x0000000000190000-0x00000000006B0000-memory.dmp
memory/1720-94-0x00000000027B0000-0x0000000002CDE000-memory.dmp
memory/320-95-0x0000000000400000-0x000000000092E000-memory.dmp
memory/320-96-0x0000000000400000-0x000000000092E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-06-21 19:28
Reported
2022-06-21 19:32
Platform
win10v2004-20220414-en
Max time kernel
147s
Max time network
152s
Command Line
Signatures
CryptBot
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\CScript.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\Ivp\bin\Two.vbs | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
| File created | C:\Program Files (x86)\Ivp\bin\setup.exe | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
| File created | C:\Program Files (x86)\Ivp\bin\looo.exe | C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\looo.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Ivp\bin\setup.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe
"C:\Users\Admin\AppData\Local\Temp\2fb01e9fadecacfcf8b7217276f0598e6366c398202730629f89a956feb51467.exe"
C:\Program Files (x86)\Ivp\bin\setup.exe
"C:\Program Files (x86)\Ivp\bin\setup.exe"
C:\Windows\SysWOW64\CScript.exe
"C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\Ivp\bin\Two.vbs" //e:vbscript //B //NOLOGO
C:\Program Files (x86)\Ivp\bin\looo.exe
"C:\Program Files (x86)\Ivp\bin\looo.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | iplogger.org | udp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| GB | 51.132.193.105:443 | tcp | |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 93.184.220.29:80 | tcp | |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.253.208.112:80 | tcp | |
| US | 8.253.208.112:80 | tcp | |
| US | 8.253.208.112:80 | tcp | |
| US | 8.8.8.8:53 | verf01.top | udp |
| FR | 2.18.109.224:443 | tcp | |
| US | 104.18.24.243:80 | tcp | |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | jload05.xyz | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
| US | 8.8.8.8:53 | verf01.top | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nskBB95.tmp\UAC.dll
| MD5 | adb29e6b186daa765dc750128649b63d |
| SHA1 | 160cbdc4cb0ac2c142d361df138c537aa7e708c9 |
| SHA256 | 2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08 |
| SHA512 | b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada |
memory/2108-131-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
C:\Users\Admin\AppData\Local\Temp\nskBB95.tmp\nsExec.dll
| MD5 | 132e6153717a7f9710dcea4536f364cd |
| SHA1 | e39bc82c7602e6dd0797115c2bd12e872a5fb2ab |
| SHA256 | d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2 |
| SHA512 | 9aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1 |
memory/4684-135-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\setup.exe
| MD5 | 0fda20e1940d351b5c28a48ef6509876 |
| SHA1 | 400ca4f1dd882bee8b6cdd31367eb1cdcfe4207a |
| SHA256 | 735d8568578b7342ad6e1def0489c2ae864c5e611b5b2c658b8edc2cee172bb1 |
| SHA512 | 35ed507a276fb3b11fc76d90130c97338f2f66d5867a20fbbe725065b8a7e70ee31f77129e408d7baee5a208460167ab2f46f52a07ccad316487622f1dc234b9 |
memory/2108-136-0x0000000000CF0000-0x0000000001210000-memory.dmp
C:\Program Files (x86)\Ivp\bin\Two.vbs
| MD5 | c6362e3c5585f24a9e9a2712c00c52ff |
| SHA1 | 9259b9609313386f004328d2c306820eae01a587 |
| SHA256 | 184ca5b2737175e0828f3546d483778c95e23720f1375deac0090c2fe415e208 |
| SHA512 | 59ac94fdb6f41d6dc5cbea1855897759f35032ac922b936a0b39a21b6aafb0c862c5d419afa31c0b81f106f2ce06b2909cdb5fb713534fbe36202c5a4fedfeaa |
memory/2108-138-0x0000000077130000-0x00000000772D3000-memory.dmp
memory/2108-139-0x0000000000CF0000-0x0000000001210000-memory.dmp
memory/204-140-0x0000000000000000-mapping.dmp
C:\Program Files (x86)\Ivp\bin\looo.exe
| MD5 | 22dbb8cea37a191fab10917f03dc25c5 |
| SHA1 | b5cccd3dda88428bae6f45f5ae544267e331b0be |
| SHA256 | 819cbebadf520b038496932c911f1d1bb4e98c86490659ef1b939ec5cc38384e |
| SHA512 | 3b069754b47087843db585f5092ddfa007293a51ddb4c84af739d1cd757a6724d1a745262bc558180af4f73d706a1351693a5fb0453ddc102a6c2fb8152b445f |
memory/204-142-0x0000000000400000-0x000000000092E000-memory.dmp
memory/204-143-0x0000000077130000-0x00000000772D3000-memory.dmp
memory/204-144-0x0000000000400000-0x000000000092E000-memory.dmp
memory/2108-145-0x0000000000CF0000-0x0000000001210000-memory.dmp
memory/2108-146-0x0000000077130000-0x00000000772D3000-memory.dmp
memory/2108-147-0x0000000000CF0000-0x0000000001210000-memory.dmp
memory/204-148-0x0000000000400000-0x000000000092E000-memory.dmp
memory/204-149-0x0000000000400000-0x000000000092E000-memory.dmp