IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
"C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\9c69749b54" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\9c69749b54" /P "user:R" /E
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
31.41.244.237/jg94cVd30f/index.php
malicious
http://31.41.244.237/jg94cVd30f/index.phpM
unknown
malicious

IPs

IP
Domain
Country
Malicious
31.41.244.237
unknown
Russian Federation
malicious
192.168.2.4
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5F0000
direct allocation
page execute and read and write
malicious
650000
direct allocation
page read and write
malicious
950000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2120000
direct allocation
page read and write
malicious
990000
direct allocation
page read and write
malicious
610000
heap
page read and write
2983000
heap
page read and write
287F000
stack
page read and write
33C0000
heap
page read and write
4361000
heap
page read and write
850000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
38C0000
heap
page read and write
34D6000
heap
page read and write
18571E20000
heap
page read and write
277E000
stack
page read and write
19B000
stack
page read and write
3397000
heap
page read and write
37EA000
heap
page read and write
3F11000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
2E90000
heap
page read and write
2B3E000
stack
page read and write
4361000
heap
page read and write
34CF000
stack
page read and write
34D0000
heap
page read and write
4361000
heap
page read and write
42E000
unkown
page write copy
4361000
heap
page read and write
4037000
trusted library allocation
page read and write
18571F40000
heap
page read and write
4361000
heap
page read and write
335A000
heap
page read and write
4361000
heap
page read and write
401000
unkown
page execute read
27B4000
heap
page read and write
3F11000
trusted library allocation
page read and write
4361000
heap
page read and write
401000
unkown
page execute read
32F0000
heap
page read and write
28FE000
stack
page read and write
38A0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
36A6000
heap
page read and write
403C000
trusted library allocation
page read and write
87A000
heap
page read and write
442000
unkown
page write copy
18571E65000
heap
page read and write
4361000
heap
page read and write
22FC000
stack
page read and write
400000
unkown
page readonly
B10000
heap
page read and write
91207A000
stack
page read and write
30000
heap
page read and write
4361000
heap
page read and write
3F11000
trusted library allocation
page read and write
640000
heap
page read and write
30000
heap
page read and write
273F000
stack
page read and write
27B0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
6A6000
heap
page read and write
3F11000
trusted library allocation
page read and write
665000
heap
page read and write
418000
unkown
page write copy
400000
unkown
page readonly
9D000
stack
page read and write
4361000
heap
page read and write
18571CE0000
heap
page read and write
2EBA000
heap
page read and write
44C000
unkown
page read and write
2FAE000
stack
page read and write
757000
heap
page read and write
3F11000
trusted library allocation
page read and write
4AE000
stack
page read and write
4361000
heap
page read and write
80F000
stack
page read and write
4361000
heap
page read and write
2994000
heap
page read and write
27C0000
direct allocation
page read and write
401000
unkown
page execute read
4361000
heap
page read and write
33C6000
heap
page read and write
339E000
stack
page read and write
452000
unkown
page readonly
4037000
trusted library allocation
page read and write
2290000
heap
page read and write
28BE000
stack
page read and write
418000
unkown
page write copy
759000
heap
page read and write
4361000
heap
page read and write
9CF000
stack
page read and write
85A000
heap
page read and write
401000
unkown
page execute read
2D7D000
stack
page read and write
6D8000
heap
page read and write
307C000
stack
page read and write
9120F9000
stack
page read and write
2B80000
heap
page read and write
780000
heap
page read and write
27B4000
heap
page read and write
4361000
heap
page read and write
3350000
heap
page read and write
2AFF000
stack
page read and write
4361000
heap
page read and write
31D0000
heap
page read and write
2E3C000
stack
page read and write
580000
heap
page read and write
400000
unkown
page readonly
8CF000
stack
page read and write
4361000
heap
page read and write
233B000
stack
page read and write
403E000
trusted library allocation
page read and write
500000
heap
page read and write
18571E6D000
heap
page read and write
2FBC000
stack
page read and write
18571E28000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
18571F20000
heap
page read and write
3F11000
trusted library allocation
page read and write
83A000
heap
page read and write
4034000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
2EC0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
401000
unkown
page execute read
4361000
heap
page read and write
18572090000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
2960000
heap
page read and write
2E7A000
heap
page read and write
18572DF0000
trusted library allocation
page read and write
403F000
trusted library allocation
page read and write
2560000
heap
page read and write
4EE000
stack
page read and write
78A000
heap
page read and write
6E3000
heap
page execute and read and write
31BF000
stack
page read and write
2FF0000
trusted library allocation
page read and write
4361000
heap
page read and write
B00000
heap
page read and write
42E000
unkown
page write copy
403A000
trusted library allocation
page read and write
4361000
heap
page read and write
3290000
heap
page read and write
4361000
heap
page read and write
4AE000
stack
page read and write
2927000
heap
page read and write
401000
unkown
page execute read
18572070000
heap
page readonly
1F0000
trusted library allocation
page read and write
2EC0000
heap
page read and write
2F90000
heap
page read and write
4361000
heap
page read and write
44C000
unkown
page read and write
9121F9000
stack
page read and write
452000
unkown
page readonly
354F000
stack
page read and write
570000
heap
page read and write
91217E000
stack
page read and write
2DC0000
heap
page read and write
4361000
heap
page read and write
318E000
stack
page read and write
442000
unkown
page write copy
452000
unkown
page readonly
36A0000
heap
page read and write
76A000
heap
page read and write
4035000
trusted library allocation
page read and write
4361000
heap
page read and write
452000
unkown
page readonly
42E000
unkown
page write copy
4361000
heap
page read and write
43E000
unkown
page execute and read and write
3270000
trusted library allocation
page read and write
270E000
stack
page read and write
18571E6D000
heap
page read and write
29BF000
stack
page read and write
303D000
stack
page read and write
32FA000
heap
page read and write
4361000
heap
page read and write
2ECA000
heap
page read and write
18571FB0000
trusted library allocation
page read and write
4361000
heap
page read and write
33DF000
stack
page read and write
6D0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
38CA000
heap
page read and write
325E000
stack
page read and write
71F000
heap
page read and write
57A000
heap
page read and write
3260000
trusted library allocation
page read and write
3040000
heap
page read and write
4361000
heap
page read and write
830000
heap
page read and write
27A0000
trusted library allocation
page read and write
617000
heap
page read and write
18572020000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
18572B90000
trusted library allocation
page read and write
37E0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
3150000
heap
page read and write
3390000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
2F10000
heap
page read and write
418000
unkown
page write copy
760000
heap
page read and write
4361000
heap
page read and write
702000
heap
page read and write
2D8D000
stack
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
350E000
stack
page read and write
4361000
heap
page read and write
3F11000
trusted library allocation
page read and write
2BED000
stack
page read and write
38AA000
heap
page read and write
2DCB000
stack
page read and write
3F11000
trusted library allocation
page read and write
32A6000
heap
page read and write
4361000
heap
page read and write
38BA000
heap
page read and write
3250000
trusted library allocation
page read and write
452000
unkown
page readonly
4361000
heap
page read and write
1F0000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
3A08000
trusted library allocation
page read and write
418000
unkown
page write copy
3F11000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
400000
unkown
page readonly
870000
heap
page read and write
4361000
heap
page read and write
2F9A000
heap
page read and write
423F000
stack
page read and write
1B0000
remote allocation
page read and write
310E000
stack
page read and write
2D20000
heap
page read and write
4361000
heap
page read and write
2C3F000
stack
page read and write
4036000
trusted library allocation
page read and write
61B000
heap
page execute and read and write
6C4000
heap
page read and write
3030000
trusted library allocation
page read and write
4361000
heap
page read and write
452000
unkown
page readonly
400000
unkown
page readonly
3F11000
trusted library allocation
page read and write
4038000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
9F0000
heap
page read and write
90F000
stack
page read and write
3057000
heap
page read and write
4361000
heap
page read and write
4036000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
42E000
unkown
page write copy
4361000
heap
page read and write
4290000
heap
page read and write
400000
unkown
page readonly
18572099000
heap
page read and write
4361000
heap
page read and write
32A0000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
3F11000
trusted library allocation
page read and write
296A000
heap
page read and write
650000
heap
page read and write
403F000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
2F7D000
stack
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
661000
heap
page read and write
94E000
stack
page read and write
38B0000
heap
page read and write
2E70000
heap
page read and write
185720A0000
trusted library allocation
page read and write
31CF000
stack
page read and write
4361000
heap
page read and write
3047000
heap
page read and write
4EE000
stack
page read and write
63A000
heap
page read and write
38BA000
heap
page read and write
314F000
stack
page read and write
332F000
stack
page read and write
2EB0000
heap
page read and write
75B000
heap
page read and write
274F000
stack
page read and write
4361000
heap
page read and write
4032000
trusted library allocation
page read and write
2FEF000
stack
page read and write
2900000
heap
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
18572080000
trusted library allocation
page read and write
9C000
stack
page read and write
38B0000
heap
page read and write
4361000
heap
page read and write
4360000
heap
page read and write
18572095000
heap
page read and write
4361000
heap
page read and write
452000
unkown
page readonly
74C000
heap
page read and write
4036000
trusted library allocation
page read and write
403F000
trusted library allocation
page read and write
4361000
heap
page read and write
911CBB000
stack
page read and write
198000
stack
page read and write
4361000
heap
page read and write
418000
unkown
page write copy
29FE000
stack
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
3F11000
trusted library allocation
page read and write
18572DA0000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
43E000
unkown
page execute and read and write
58A000
heap
page read and write
3F11000
trusted library allocation
page read and write
4361000
heap
page read and write
418000
unkown
page write copy
3F11000
trusted library allocation
page read and write
317E000
stack
page read and write
452000
unkown
page readonly
3F11000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
263E000
stack
page read and write
3157000
heap
page read and write
3280000
heap
page read and write
2C7E000
stack
page read and write
4361000
heap
page read and write
4361000
heap
page read and write
18571E66000
heap
page read and write
42E000
unkown
page write copy
2920000
heap
page read and write
6B0000
heap
page read and write
4361000
heap
page read and write
2ECA000
heap
page read and write
18571E6D000
heap
page read and write
18571CF0000
trusted library allocation
page read and write
18572060000
trusted library allocation
page read and write
AFF000
stack
page read and write
18571FC0000
trusted library allocation
page read and write
32EE000
stack
page read and write
BE0000
heap
page read and write
510000
heap
page read and write
4361000
heap
page read and write
42E000
unkown
page write copy
4361000
heap
page read and write
403F000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
515000
heap
page read and write
3050000
heap
page read and write
4032000
trusted library allocation
page read and write
4361000
heap
page read and write
There are 366 hidden memdumps, click here to show them.