IOC Report
Walls.cmd

loading gif

Files

File Path
Type
Category
Malicious
Walls.cmd
ASCII text, with very long lines (873), with CRLF line terminators
initial sample
malicious
C:\Users\user\Desktop\459250\Spa.com
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Walls.cmd" "
malicious
C:\Windows\System32\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\System32\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\System32\cmd.exe
cmd /c md 459250
malicious
C:\Windows\System32\findstr.exe
findstr /V "Sorry" Branches
malicious
C:\Windows\System32\cmd.exe
cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\choice.exe
choice /d y /t 5

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1E5B3DEC000
heap
page read and write
1E5B3DBC000
heap
page read and write
3EF6BFF000
stack
page read and write
1A0079CD000
heap
page read and write
1E5B3DEC000
heap
page read and write
1A0079F5000
heap
page read and write
260FCD20000
heap
page read and write
1E5B3DB6000
heap
page read and write
1A007870000
heap
page read and write
1A0079FA000
heap
page read and write
1E5B3DCB000
heap
page read and write
1E5B3D60000
heap
page read and write
1E5B3D80000
heap
page read and write
1A007970000
heap
page read and write
1A0079C7000
heap
page read and write
1A0079FE000
heap
page read and write
1A0079EC000
heap
page read and write
419EFF000
stack
page read and write
1A007C4A000
heap
page read and write
1E5B3E90000
heap
page read and write
1A0079F6000
heap
page read and write
260FCA59000
heap
page read and write
419F7F000
stack
page read and write
1E5B3DDE000
heap
page read and write
1E5B3DE8000
heap
page read and write
1A007C44000
heap
page read and write
1E5B3DE5000
heap
page read and write
1A0079C8000
heap
page read and write
1A0079D9000
heap
page read and write
41A07E000
stack
page read and write
1E5B3DB7000
heap
page read and write
3EF6A7B000
stack
page read and write
1A0079C7000
heap
page read and write
1E5B3DEC000
heap
page read and write
1E5B3DDF000
heap
page read and write
419BAB000
stack
page read and write
1E5B3D90000
heap
page read and write
1A007950000
heap
page read and write
1E5B3D84000
heap
page read and write
1E5B3DEA000
heap
page read and write
CE04D3C000
stack
page read and write
3EF6B7E000
stack
page read and write
1E5B3DE8000
heap
page read and write
1A0079EC000
heap
page read and write
1A0079EC000
heap
page read and write
1A0079FD000
heap
page read and write
CE0507F000
stack
page read and write
1E5B3DE7000
heap
page read and write
260FC890000
heap
page read and write
1A0079E6000
heap
page read and write
1A0079EC000
heap
page read and write
3EF6AFE000
stack
page read and write
1A0079EC000
heap
page read and write
1A0079A8000
heap
page read and write
419FFF000
stack
page read and write
3EF6C7F000
stack
page read and write
1E5B3DE1000
heap
page read and write
260FC970000
heap
page read and write
1A0079D8000
heap
page read and write
1E5B3C80000
heap
page read and write
1E5B3DBC000
heap
page read and write
1E5B3DB6000
heap
page read and write
1E5B3DCC000
heap
page read and write
1A0079A0000
heap
page read and write
260FCA50000
heap
page read and write
1E5B3DDE000
heap
page read and write
1E5B3D8A000
heap
page read and write
1A0079E5000
heap
page read and write
260FC990000
heap
page read and write
1E5B3DEC000
heap
page read and write
1E5B3DEC000
heap
page read and write
1E5B3DF2000
heap
page read and write
1E5B3DDE000
heap
page read and write
1E5B3DDE000
heap
page read and write
419E7F000
stack
page read and write
1E5B3DEF000
heap
page read and write
1E5B3DDE000
heap
page read and write
CE04DBE000
stack
page read and write
260FCD24000
heap
page read and write
1A0079FD000
heap
page read and write
3EF6CFF000
stack
page read and write
1A007C40000
heap
page read and write
1A0079FD000
heap
page read and write
There are 73 hidden memdumps, click here to show them.