IOC Report
MDE_File_Sample_23cd0d899ada82527bfb8461d6df5489f19e8359.zip

loading gif

Files

File Path
Type
Category
Malicious
MDE_File_Sample_23cd0d899ada82527bfb8461d6df5489f19e8359.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_23cd0d899ada82527bfb8461d6df5489f19e8359.zip\ResourceHacker.ini
Generic INItialization configuration [MonospaceFont]
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_23cd0d899ada82527bfb8461d6df5489f19e8359.zip\ResourceHacker.exe
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_23cd0d899ada82527bfb8461d6df5489f19e8359.zip\ResourceHacker.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.greenfishsoftware.org/
unknown
http://www.angusj.com/resourcehacker/
unknown
http://www.angusj.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4780000
trusted library allocation
page read and write
C1B000
heap
page read and write
791000
unkown
page readonly
78A000
unkown
page write copy
2FEC000
direct allocation
page read and write
773000
unkown
page read and write
28E1000
direct allocation
page read and write
BDC000
heap
page read and write
1196000
heap
page read and write
47CA6FE000
stack
page read and write
BA0000
heap
page read and write
4780000
trusted library allocation
page read and write
401000
unkown
page execute read
8F3000
unkown
page readonly
47CA67C000
stack
page read and write
2882000
direct allocation
page read and write
119B000
heap
page read and write
27EB000
direct allocation
page read and write
28E8000
direct allocation
page read and write
2864000
direct allocation
page read and write
1190000
heap
page read and write
280A000
direct allocation
page read and write
B5E000
stack
page read and write
27F3000
direct allocation
page read and write
831000
unkown
page readonly
2B93000
heap
page read and write
315E000
stack
page read and write
285D000
direct allocation
page read and write
288A000
direct allocation
page read and write
C19000
heap
page read and write
17D78AC5000
heap
page read and write
BC7000
heap
page read and write
C18000
heap
page read and write
BBD000
heap
page read and write
B1E000
stack
page read and write
311F000
stack
page read and write
1150000
direct allocation
page execute and read and write
C07000
heap
page read and write
853000
unkown
page readonly
76A000
unkown
page read and write
17D78800000
heap
page read and write
BF8000
heap
page read and write
91E000
unkown
page readonly
27DD000
direct allocation
page read and write
A70000
heap
page read and write
C12000
heap
page read and write
28A8000
direct allocation
page read and write
400000
unkown
page readonly
BCB000
heap
page read and write
BA8000
heap
page read and write
17D788B0000
heap
page read and write
BE9000
heap
page read and write
A96000
heap
page read and write
17D787E0000
heap
page read and write
4DE0000
trusted library allocation
page read and write
28C4000
direct allocation
page read and write
27CE000
direct allocation
page read and write
17D78A60000
heap
page read and write
BF3000
heap
page read and write
2B6E000
stack
page read and write
33A0000
heap
page read and write
78F000
unkown
page readonly
4780000
trusted library allocation
page read and write
287B000
direct allocation
page read and write
28BD000
direct allocation
page read and write
2898000
direct allocation
page read and write
BD8000
heap
page read and write
8C2000
unkown
page readonly
4780000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
BDE000
heap
page read and write
C05000
heap
page read and write
17D788B8000
heap
page read and write
2FCD000
direct allocation
page read and write
281A000
direct allocation
page read and write
BD1000
heap
page read and write
867000
unkown
page readonly
768000
unkown
page write copy
3002000
direct allocation
page read and write
47CA7FE000
stack
page read and write
27D5000
direct allocation
page read and write
3009000
direct allocation
page read and write
BDB000
heap
page read and write
968000
unkown
page readonly
C01000
heap
page read and write
BD7000
heap
page read and write
BE5000
heap
page read and write
17D78AC0000
heap
page read and write
4780000
trusted library allocation
page read and write
283A000
direct allocation
page read and write
C10000
heap
page read and write
325F000
stack
page read and write
1140000
heap
page read and write
BD9000
heap
page read and write
2874000
direct allocation
page read and write
329E000
stack
page read and write
990000
heap
page read and write
E9F000
stack
page read and write
2B10000
heap
page read and write
286C000
direct allocation
page read and write
BF5000
heap
page read and write
27B0000
direct allocation
page read and write
76F000
unkown
page read and write
2B90000
heap
page read and write
BE0000
heap
page read and write
BED000
heap
page read and write
C19000
heap
page read and write
2813000
direct allocation
page read and write
C05000
heap
page read and write
4780000
trusted library allocation
page read and write
95000
stack
page read and write
BFA000
heap
page read and write
768000
unkown
page read and write
2811000
direct allocation
page read and write
778000
unkown
page read and write
27FA000
direct allocation
page read and write
3010000
direct allocation
page read and write
4780000
trusted library allocation
page read and write
BDB000
heap
page read and write
28CC000
direct allocation
page read and write
ADE000
stack
page read and write
47CA77F000
stack
page read and write
339F000
stack
page read and write
2854000
direct allocation
page read and write
BD8000
heap
page read and write
27E4000
direct allocation
page read and write
BC8000
heap
page read and write
BD4000
heap
page read and write
BFE000
heap
page read and write
2FFA000
direct allocation
page read and write
28D3000
direct allocation
page read and write
BE2000
heap
page read and write
28DA000
direct allocation
page read and write
7FA000
unkown
page readonly
F9F000
stack
page read and write
19A000
stack
page read and write
A90000
heap
page read and write
4780000
trusted library allocation
page read and write
D9E000
stack
page read and write
17D78700000
heap
page read and write
BDB000
heap
page read and write
C1C000
heap
page read and write
27BE000
direct allocation
page read and write
2822000
direct allocation
page read and write
BCF000
heap
page read and write
BCB000
heap
page read and write
There are 136 hidden memdumps, click here to show them.