Analysis
-
max time kernel
600s -
max time network
366s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 11:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
IM00114PRES.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
600 seconds
General
-
Target
IM00114PRES.exe
-
Size
12.0MB
-
MD5
0788c6ffcf438e660909c108c60984d4
-
SHA1
e36b267a952dbc7f3d2dc09cb087a44af43a5ae3
-
SHA256
9d2c845c497b734d8cfa74b90cbb1191fc25de53652c8b4d510a23cca75dfba7
-
SHA512
1590776a8f40ef600624e01fee8d74823793dfec059bb8fd3099629b31b5a2e189708ee298243e90ac44e27c43078ed4291a652434e003761f9dd3dcf627b69d
-
SSDEEP
49152:NFZaH72h213UhRjvtw2WvwMwB9ydpyn4ewRcuBaHaK0NyqZm8NPnroNygC8aCOku:NFH21
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2620-32-0x0000000013140000-0x0000000014A74000-memory.dmp upx -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
IM00114PRES.exeIM00114PRES.exedescription pid Process procid_target PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 1196 wrote to memory of 2780 1196 IM00114PRES.exe 31 PID 1196 wrote to memory of 2780 1196 IM00114PRES.exe 31 PID 1196 wrote to memory of 2780 1196 IM00114PRES.exe 31 PID 1196 wrote to memory of 2780 1196 IM00114PRES.exe 31 PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 1196 wrote to memory of 2620 1196 IM00114PRES.exe 30 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32 PID 2780 wrote to memory of 1632 2780 IM00114PRES.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe"C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exeC:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe CMKAUWWWWWWA2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe3⤵PID:1632
-
-