IOC Report
RpcSsv.exe

loading gif

Files

File Path
Type
Category
Malicious
RpcSsv.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RpcSsv.exe
"C:\Users\user\Desktop\RpcSsv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://secure.globalsign.net/cacert/PrimObject.crt0
unknown
http://secure.globalsign.net/cacert/ObjectSign.crt09
unknown
http://www.globalsign.net/repository09
unknown
http://eternallybored.org/misc/netcat/
unknown
http://www.globalsign.net/repository/0
unknown
http://www.globalsign.net/repository/03
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
409000
unkown
page readonly
malicious
409000
unkown
page readonly
malicious
80000
heap
page read and write
1E0000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
736000
heap
page read and write
40C000
unkown
page read and write
400000
unkown
page readonly
160000
heap
page read and write
180000
heap
page read and write
60D000
stack
page read and write
730000
heap
page read and write
73B000
heap
page read and write
408000
unkown
page write copy
40D000
unkown
page write copy
40C000
unkown
page write copy
408000
unkown
page read and write
401000
unkown
page execute read
There are 9 hidden memdumps, click here to show them.