Analysis
-
max time kernel
604s -
max time network
612s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 11:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
IM00114PRES.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
600 seconds
General
-
Target
IM00114PRES.exe
-
Size
12.0MB
-
MD5
0788c6ffcf438e660909c108c60984d4
-
SHA1
e36b267a952dbc7f3d2dc09cb087a44af43a5ae3
-
SHA256
9d2c845c497b734d8cfa74b90cbb1191fc25de53652c8b4d510a23cca75dfba7
-
SHA512
1590776a8f40ef600624e01fee8d74823793dfec059bb8fd3099629b31b5a2e189708ee298243e90ac44e27c43078ed4291a652434e003761f9dd3dcf627b69d
-
SSDEEP
49152:NFZaH72h213UhRjvtw2WvwMwB9ydpyn4ewRcuBaHaK0NyqZm8NPnroNygC8aCOku:NFH21
Malware Config
Signatures
-
Bandook payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4248-33-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-32-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-34-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-35-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-36-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-39-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-41-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/4248-46-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/732-98-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook behavioral2/memory/732-101-0x0000000013140000-0x0000000014A74000-memory.dmp family_bandook -
Processes:
resource yara_rule behavioral2/memory/4248-29-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-31-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-33-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-32-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-34-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-35-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-36-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-39-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-41-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/4248-46-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/732-98-0x0000000013140000-0x0000000014A74000-memory.dmp upx behavioral2/memory/732-101-0x0000000013140000-0x0000000014A74000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msinfo32.exepid Process 4248 msinfo32.exe 4248 msinfo32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
IM00114PRES.exeIM00114PRES.exedescription pid Process procid_target PID 1988 wrote to memory of 4248 1988 IM00114PRES.exe 107 PID 1988 wrote to memory of 4248 1988 IM00114PRES.exe 107 PID 1988 wrote to memory of 4248 1988 IM00114PRES.exe 107 PID 1988 wrote to memory of 2728 1988 IM00114PRES.exe 108 PID 1988 wrote to memory of 2728 1988 IM00114PRES.exe 108 PID 1988 wrote to memory of 2728 1988 IM00114PRES.exe 108 PID 1988 wrote to memory of 4248 1988 IM00114PRES.exe 107 PID 1988 wrote to memory of 4248 1988 IM00114PRES.exe 107 PID 2728 wrote to memory of 732 2728 IM00114PRES.exe 109 PID 2728 wrote to memory of 732 2728 IM00114PRES.exe 109 PID 2728 wrote to memory of 732 2728 IM00114PRES.exe 109 PID 2728 wrote to memory of 732 2728 IM00114PRES.exe 109 PID 2728 wrote to memory of 732 2728 IM00114PRES.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe"C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IM00114PRES.exeC:\Users\Admin\AppData\Local\Temp\IM00114PRES.exe CMKAUWWWWWWA2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe3⤵PID:732
-
-