IOC Report
Iyto7FYCJO.exe

loading gif

Files

File Path
Type
Category
Malicious
Iyto7FYCJO.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\Vulnerability.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Windows\driver.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Iyto7FYCJO.exe
"C:\Users\user\Desktop\Iyto7FYCJO.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c cd C:\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sys
malicious
C:\Windows\Vulnerability.exe
C:\Windows\Vulnerability.exe C:\Windows\driver.sys
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
malicious
C:\Windows\System32\cmd.exe
cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\certutil.exe
certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5
C:\Windows\System32\find.exe
find /i /v "md5"
C:\Windows\System32\find.exe
find /i /v "certutil"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1308 -s 1708
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.101.104.122/driver.sysl
unknown
http://185.101.104.122/Vulnerability.exe
185.101.104.122
https://keyauth.win/api/1.2/http://185.101.104.122/Vulnerability.exeC:
unknown
http://185.101.104.122/Vulnerability.exev
unknown
https://www.behance.net/madetypeFree
unknown
http://185.101.104.122/driver.sysW
unknown
http://185.101.104.122/driver.sysC:
unknown
http://185.101.104.122/Vulnerability.exeC:
unknown
https://keyauth.win/api/1.2/2(f
unknown
http://185.101.104.122/driver.syse
unknown
http://185.101.104.122/driver.sys
185.101.104.122
https://curl.haxx.se/docs/http-cookies.html
unknown
https://keyauth.win/api/1.2/
unknown
http://185.101.104.122/Vulnerability.exeC9?
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
keyauth.win
172.67.72.57

IPs

IP
Domain
Country
Malicious
172.67.72.57
keyauth.win
United States
185.101.104.122
unknown
Romania
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name

Memdumps

Base Address
Regiontype
Protect
Malicious
1F89D415000
heap
page read and write
E9DB11E000
stack
page read and write
7FF7738E0000
unkown
page readonly
D8D0CFF000
stack
page read and write
2B69CF50000
heap
page read and write
22AC022F000
heap
page read and write
22AC023F000
heap
page read and write
7FF7738E0000
unkown
page readonly
1C4AEBE0000
heap
page read and write
22AC01FF000
heap
page read and write
2B69EEE0000
remote allocation
page read and write
9F3D87C000
stack
page read and write
1E185250000
heap
page read and write
9F3D97E000
stack
page read and write
2B0064E0000
heap
page read and write
2B69E836000
heap
page read and write
D8D04FE000
stack
page read and write
22AC0180000
trusted library allocation
page read and write
743C9FF000
stack
page read and write
1E1850B0000
heap
page read and write
2B69CF10000
heap
page read and write
22AC1C00000
remote allocation
page read and write
1C4AEC30000
heap
page read and write
7FF7A2710000
unkown
page readonly
2B69E7F0000
heap
page read and write
1C4AEB90000
heap
page read and write
743C1FE000
stack
page read and write
2B69EEE0000
remote allocation
page read and write
339CA7F000
stack
page read and write
22AC1C00000
remote allocation
page read and write
7FF7A27CB000
unkown
page readonly
1E185040000
heap
page read and write
22AC1C00000
remote allocation
page read and write
7FF7A27F2000
unkown
page read and write
2B69EEF0000
trusted library allocation
page read and write
D8D06FE000
stack
page read and write
22AC023A000
heap
page read and write
22AC0205000
heap
page read and write
22AC023D000
heap
page read and write
743C5FB000
stack
page read and write
1F89BA40000
heap
page read and write
22AC1CC4000
heap
page read and write
7FF773904000
unkown
page readonly
22AC0233000
heap
page read and write
7FF7A2810000
unkown
page readonly
7FF7738E1000
unkown
page execute read
7FF7A2825000
unkown
page execute read
7FF7738E1000
unkown
page execute read
22AC019C000
heap
page read and write
BD4BA7C000
stack
page read and write
7FF7A3165000
unkown
page readonly
7FF7738F6000
unkown
page readonly
743C0FF000
stack
page read and write
2B69E945000
heap
page read and write
22AC021C000
heap
page read and write
2B006440000
heap
page read and write
2B69D030000
heap
page read and write
22AC0110000
heap
page read and write
1C4AEBE5000
heap
page read and write
2B69CF00000
heap
page read and write
7FF773904000
unkown
page readonly
2B0081C0000
heap
page read and write
2B69E7F4000
heap
page read and write
2B69E8F0000
heap
page read and write
2B69CDF0000
heap
page read and write
E9DB19D000
stack
page read and write
2B006509000
heap
page read and write
7FF7A281B000
unkown
page execute read
1E1850B8000
heap
page read and write
E9DB09C000
stack
page read and write
D8D0BFE000
stack
page read and write
7FF7A2711000
unkown
page execute read
743C8FD000
stack
page read and write
339C78F000
stack
page read and write
7FF7A2B9B000
unkown
page execute read
22AC1B90000
heap
page read and write
7FF7A2830000
unkown
page execute read
22AC020A000
heap
page read and write
2B69D00D000
heap
page read and write
339C70C000
stack
page read and write
2B006330000
heap
page read and write
D8D08FE000
stack
page read and write
2B69CED0000
heap
page read and write
2B006410000
heap
page read and write
1C4AEB60000
heap
page read and write
2B69CF05000
heap
page read and write
D8D05FE000
stack
page read and write
743C4FF000
stack
page read and write
1F89BA78000
heap
page read and write
2B69E867000
heap
page read and write
743BFFE000
stack
page read and write
D8D09FF000
stack
page read and write
7FF7A3165000
unkown
page readonly
1F89D410000
heap
page read and write
7FF7A282C000
unkown
page execute read
1C4AEC3A000
heap
page read and write
BD4BAFF000
stack
page read and write
7FF7738F6000
unkown
page readonly
1F89BA70000
heap
page read and write
22AC021C000
heap
page read and write
D8D07FE000
stack
page read and write
2B006500000
heap
page read and write
22AC1B20000
trusted library allocation
page read and write
743BEF6000
stack
page read and write
22AC0170000
heap
page read and write
2B69E83F000
heap
page read and write
E9DB47E000
stack
page read and write
22AC01BC000
heap
page read and write
22AC1B00000
heap
page read and write
D8D0AFB000
stack
page read and write
7FF7A2819000
unkown
page execute read
22AC0150000
heap
page read and write
1E184F40000
heap
page read and write
2B0064E5000
heap
page read and write
22AC1C00000
remote allocation
page read and write
7FF7A2821000
unkown
page execute read
22AC0175000
heap
page read and write
1E1850BB000
heap
page read and write
2B69EF30000
heap
page read and write
2B69E957000
heap
page read and write
1F89BA50000
heap
page read and write
1E185020000
heap
page read and write
1C4AEB70000
heap
page read and write
22AC1CC0000
heap
page read and write
22AC0190000
heap
page read and write
743C7FD000
stack
page read and write
22AC0224000
heap
page read and write
1E185255000
heap
page read and write
7FF7A2849000
unkown
page read and write
743C3FE000
stack
page read and write
9F3D8FF000
stack
page read and write
7FF773903000
unkown
page write copy
22AC0224000
heap
page read and write
2B69CF5C000
heap
page read and write
7FF773903000
unkown
page read and write
2B008350000
heap
page read and write
1F89D420000
heap
page read and write
7FF7A284F000
unkown
page execute read
7FF7A2710000
unkown
page readonly
743C2FE000
stack
page read and write
1C4AEC38000
heap
page read and write
D8D0176000
stack
page read and write
22AC0120000
heap
page read and write
2B69CFC9000
heap
page read and write
743C6FE000
stack
page read and write
2B69EEE0000
remote allocation
page read and write
2B69EEF0000
trusted library allocation
page read and write
BD4BB7F000
stack
page read and write
There are 138 hidden memdumps, click here to show them.