IOC Report
signed.exe

loading gif

Files

File Path
Type
Category
Malicious
signed.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Windows\etrnview.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RealLegal E-Transcript Viewer\RealLegal E-Transcript Viewer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 14:15:38 2024, mtime=Wed May 22 14:15:38 2024, atime=Wed May 22 14:15:38 2024, length=380928, window=hide
dropped
C:\Users\Public\Desktop\RealLegal E-Transcript Viewer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 14:15:38 2024, mtime=Wed May 22 14:15:38 2024, atime=Wed May 22 14:15:38 2024, length=380928, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\signed.exe
"C:\Users\user\Desktop\signed.exe"
malicious

URLs

Name
IP
Malicious
http://www.reallegal.com/
unknown
http://www.reallegal.com/binderpull.asp
unknown
http://www.reallegal.com/binderpull.asp.http://www.deposchedule.com/By
unknown
http://www.deposchedule.com/
unknown
http://www.reallegal.com
unknown

Domains

Name
IP
Malicious
206.23.85.13.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ptx
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ptx
ContentType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ptxfile
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ptxfile\shell\open\command
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
2B8E000
stack
page read and write
21C0000
heap
page read and write
449000
unkown
page readonly
1F0000
heap
page read and write
23A4000
heap
page read and write
21E0000
heap
page read and write
525000
heap
page read and write
441000
unkown
page read and write
5D9000
heap
page read and write
437000
unkown
page readonly
400000
unkown
page readonly
2C8F000
stack
page read and write
444000
unkown
page write copy
5B0000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
21FF000
heap
page read and write
570000
heap
page read and write
5A0000
heap
page read and write
447000
unkown
page read and write
444000
unkown
page read and write
437000
unkown
page readonly
613000
heap
page read and write
2A1E000
stack
page read and write
5B5000
heap
page read and write
2DCF000
stack
page read and write
470000
heap
page read and write
95000
stack
page read and write
550000
heap
page read and write
2B1F000
stack
page read and write
5DE000
heap
page read and write
43C000
unkown
page write copy
19A000
stack
page read and write
41A0000
trusted library allocation
page read and write
21F0000
heap
page read and write
2CCE000
stack
page read and write
578000
heap
page read and write
5B9000
heap
page read and write
449000
unkown
page readonly
400000
unkown
page readonly
236E000
stack
page read and write
29DE000
stack
page read and write
5D0000
heap
page read and write
43C000
unkown
page write copy
619000
heap
page read and write
520000
heap
page read and write
622000
heap
page read and write
23A0000
heap
page read and write
There are 38 hidden memdumps, click here to show them.