IOC Report
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
C:\Windows\System32\certutil.exe
certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.29020.27952.exe" MD5
C:\Windows\System32\find.exe
find /i /v "md5"
C:\Windows\System32\find.exe
find /i /v "certutil"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
C:\Windows\System32\cmd.exe
cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4712 -s 516
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://keyauth.win/api/1.2/L
unknown
https://keyauth.win/api/1.2/y=
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://keyauth.win/api/1.2/
unknown

Domains

Name
IP
Malicious
keyauth.win
104.26.0.5

IPs

IP
Domain
Country
Malicious
104.26.0.5
keyauth.win
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name

Memdumps

Base Address
Regiontype
Protect
Malicious
202D8147000
heap
page read and write
21D7AB45000
heap
page read and write
1F0000
direct allocation
page read and write
1F0000
direct allocation
page read and write
2100A1C0000
heap
page read and write
21D7A910000
heap
page read and write
1F0000
direct allocation
page read and write
1F0000
direct allocation
page read and write
21008650000
heap
page read and write
1430B8000
unkown
page execute read
E662E7F000
stack
page read and write
AD6337F000
stack
page read and write
1F0000
remote allocation
page read and write
1EE19E00000
heap
page read and write
14007C000
unkown
page readonly
1F0000
remote allocation
page read and write
1400A2000
unkown
page execute and read and write
FF6C59C000
stack
page read and write
22C0000
direct allocation
page read and write
1F0000
direct allocation
page read and write
1E5000
heap
page read and write
4EC000
heap
page read and write
143AB8000
unkown
page execute read
4E6000
heap
page read and write
1F0000
direct allocation
page read and write
143AB8000
unkown
page execute read
7FF880000000
direct allocation
page execute and read and write
1426B8000
unkown
page execute read
143000
stack
page read and write
1EE19E0A000
heap
page read and write
202D8420000
heap
page read and write
180000
heap
page read and write
2100A1C5000
heap
page read and write
FF6C8FF000
stack
page read and write
1423B4000
unkown
page execute and read and write
202D7F80000
heap
page read and write
1414A2000
unkown
page execute and read and write
21D7AA10000
heap
page read and write
1400A0000
unkown
page read and write
14009A000
unkown
page readonly
FF6C97F000
stack
page read and write
1430B8000
unkown
page execute read
140098000
unkown
page read and write
517000
heap
page read and write
AD633FF000
stack
page read and write
142370000
unkown
page execute and read and write
1EE19D80000
heap
page read and write
1EE19DB0000
heap
page read and write
14C000
stack
page read and write
21D7A8D0000
heap
page read and write
1400A0000
unkown
page write copy
AD632FC000
stack
page read and write
140000000
unkown
page readonly
4E0000
heap
page read and write
1420D6000
unkown
page execute and read and write
140001000
unkown
page execute read
202D8060000
heap
page read and write
190000
heap
page read and write
1444B8000
unkown
page execute read
1E0000
heap
page read and write
E662BFF000
stack
page read and write
1EE19D90000
heap
page read and write
21D7A919000
heap
page read and write
1F0000
direct allocation
page read and write
1F0000
remote allocation
page read and write
21D7A7F0000
heap
page read and write
260F000
stack
page read and write
1EE19E07000
heap
page read and write
7FF880030000
direct allocation
page execute and read and write
1F0000
remote allocation
page read and write
1EE19DD5000
heap
page read and write
142374000
unkown
page execute and read and write
14007C000
unkown
page readonly
FF6C87E000
stack
page read and write
250F000
stack
page read and write
51B000
heap
page read and write
210086F0000
heap
page read and write
210086A0000
heap
page read and write
14009A000
unkown
page readonly
1EE19DD0000
heap
page read and write
7DE000
stack
page read and write
8D00FAC000
stack
page read and write
210086F8000
heap
page read and write
140000000
unkown
page readonly
1F0000
direct allocation
page read and write
8D012FF000
stack
page read and write
202D8140000
heap
page read and write
E662B7C000
stack
page read and write
202D814A000
heap
page read and write
140001000
unkown
page execute read
140AA2000
unkown
page execute and read and write
21D7C770000
heap
page read and write
202D8080000
heap
page read and write
21D7C7F0000
heap
page read and write
1444B8000
unkown
page execute read
1426B8000
unkown
page execute read
21008660000
heap
page read and write
8D0127F000
stack
page read and write
1F0000
direct allocation
page read and write
240E000
stack
page read and write
202D8425000
heap
page read and write
141EA2000
unkown
page execute and read and write
1C0000
heap
page read and write
140098000
unkown
page write copy
1F0000
direct allocation
page read and write
1423BA000
unkown
page execute and read and write
21D7AB40000
heap
page read and write
6DF000
stack
page read and write
There are 98 hidden memdumps, click here to show them.