IOC Report
SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
"C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
"C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp" /SL5="$1043A,2318969,53248,C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"

URLs

Name
IP
Malicious
http://cyworld.nate.com/nuclear_mine
unknown
http://www.innosetup.com/
unknown
http://www.remobjects.com/?ps
unknown
http://ispp.sourceforge.net/
unknown
http://ispp.sourceforge.net/Des
unknown
http://www.remobjects.com/?psU
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
491000
unkown
page read and write
5CF000
heap
page read and write
2150000
heap
page read and write
4F0000
heap
page read and write
2770000
trusted library allocation
page read and write
494000
unkown
page write copy
401000
unkown
page execute read
580000
heap
page read and write
21B0000
direct allocation
page read and write
4A0E000
stack
page read and write
65A000
heap
page read and write
48AE000
stack
page read and write
338F000
stack
page read and write
30F0000
direct allocation
page read and write
2198000
direct allocation
page read and write
40D000
unkown
page write copy
21A6000
direct allocation
page read and write
420000
heap
page read and write
491000
unkown
page write copy
4C0000
heap
page read and write
2101000
direct allocation
page read and write
5AC000
heap
page read and write
328E000
stack
page read and write
2180000
heap
page read and write
2330000
heap
page read and write
324F000
stack
page read and write
20F0000
direct allocation
page read and write
4A2000
unkown
page readonly
21B0000
direct allocation
page read and write
650000
heap
page read and write
560000
heap
page read and write
19A000
stack
page read and write
5D0000
heap
page read and write
2334000
heap
page read and write
60B000
heap
page read and write
401000
unkown
page execute read
20F4000
direct allocation
page read and write
30F0000
heap
page read and write
411000
unkown
page readonly
400000
unkown
page readonly
2189000
heap
page read and write
21BF000
direct allocation
page read and write
58A000
heap
page read and write
2360000
direct allocation
page read and write
9B000
stack
page read and write
2210000
heap
page read and write
401000
unkown
page execute read
91000
stack
page read and write
400000
unkown
page readonly
40B000
unkown
page read and write
2360000
direct allocation
page read and write
21A4000
direct allocation
page read and write
2185000
heap
page read and write
400000
unkown
page readonly
19D000
stack
page read and write
2195000
direct allocation
page read and write
314E000
stack
page read and write
21D8000
direct allocation
page read and write
2101000
direct allocation
page read and write
40B000
unkown
page write copy
4C90000
trusted library allocation
page read and write
21BD000
direct allocation
page read and write
65E000
heap
page read and write
2160000
heap
page read and write
30F0000
direct allocation
page read and write
4B0F000
stack
page read and write
401000
unkown
page execute read
566000
heap
page read and write
4A2000
unkown
page readonly
58E000
heap
page read and write
430000
heap
page read and write
411000
unkown
page readonly
26E0000
heap
page read and write
49AE000
stack
page read and write
2120000
direct allocation
page execute and read and write
21B0000
direct allocation
page read and write
400000
unkown
page readonly
4D0000
heap
page read and write
2108000
direct allocation
page read and write
2190000
direct allocation
page read and write
There are 70 hidden memdumps, click here to show them.