IOC Report
sample-20240612.exe

loading gif

Files

File Path
Type
Category
Malicious
sample-20240612.exe
PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\Pictures\pressica.exe
PE32 executable (console) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\Pictures\pressica.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sample-20240612.exe
"C:\Users\user\Desktop\sample-20240612.exe"
malicious
C:\Windows\SysWOW64\mspaint.exe
mspaint.exe
malicious
C:\Users\user\Pictures\pressica.exe
"C:\Users\user\Pictures\pressica.exe"
malicious
C:\Windows\SysWOW64\mspaint.exe
mspaint.exe
malicious
C:\Users\user\Pictures\pressica.exe
"C:\Users\user\Pictures\pressica.exe"
malicious
C:\Windows\SysWOW64\mspaint.exe
mspaint.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\xcopy.exe
"C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

Domains

Name
IP
Malicious
S(]H7p#}ho:P4p__.str4ng3l.ov
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
VirtualBox Guest Additions Manager

Memdumps

Base Address
Regiontype
Protect
Malicious
741000
heap
page read and write
malicious
6E0000
remote allocation
page execute and read and write
malicious
52B000
heap
page read and write
malicious
730000
remote allocation
page execute and read and write
malicious
3230000
remote allocation
page execute and read and write
malicious
6A1000
heap
page read and write
malicious
410000
heap
page read and write
18C000
stack
page read and write
3D0E000
stack
page read and write
739000
heap
page read and write
410000
heap
page read and write
C30000
heap
page read and write
400000
unkown
page readonly
6BE000
heap
page read and write
227E000
stack
page read and write
5C0000
heap
page read and write
40C000
unkown
page execute and read and write
5D0000
heap
page read and write
75E000
heap
page read and write
5E5000
heap
page read and write
501000
heap
page read and write
741000
heap
page read and write
8F5000
heap
page read and write
3834000
heap
page read and write
5E0000
heap
page read and write
400000
unkown
page readonly
91B000
heap
page read and write
221E000
stack
page read and write
3D10000
trusted library allocation
page read and write
5E5000
heap
page read and write
4FE000
heap
page read and write
40D000
unkown
page execute and write copy
6A6000
heap
page read and write
40A000
unkown
page execute and read and write
505000
heap
page read and write
18E000
stack
page read and write
9F0000
heap
page read and write
4E0000
heap
page read and write
73E000
heap
page read and write
A8F000
stack
page read and write
7BF000
stack
page read and write
40C000
unkown
page execute and write copy
40C000
unkown
page execute and read and write
710000
heap
page read and write
48ED000
stack
page read and write
8BE000
stack
page read and write
720000
heap
page read and write
A00000
heap
page read and write
530000
heap
page read and write
A99000
heap
page read and write
517000
heap
page read and write
6A1000
heap
page read and write
6BE000
heap
page read and write
23BE000
stack
page read and write
410000
heap
page read and write
242E000
stack
page read and write
22EF000
stack
page read and write
49E000
stack
page read and write
4A0000
heap
page read and write
40C000
unkown
page execute and write copy
A95000
heap
page read and write
8C0000
heap
page read and write
18C000
stack
page read and write
51B000
heap
page read and write
67F000
stack
page read and write
A50000
heap
page read and write
57E000
stack
page read and write
40D000
unkown
page execute and write copy
509000
heap
page read and write
18E000
stack
page read and write
9A000
stack
page read and write
400000
unkown
page readonly
A54000
heap
page read and write
45E000
stack
page read and write
3D30000
trusted library allocation
page read and write
8F9000
heap
page read and write
40E000
unkown
page write copy
40E000
unkown
page read and write
24BF000
stack
page read and write
910000
heap
page read and write
5E0000
heap
page read and write
401000
unkown
page execute and read and write
518000
heap
page read and write
2320000
heap
page read and write
A05000
heap
page read and write
8D0000
heap
page read and write
40E000
unkown
page write copy
231F000
stack
page read and write
680000
heap
page read and write
4F9000
heap
page read and write
745000
heap
page read and write
87F000
stack
page read and write
40C000
unkown
page execute and write copy
19D000
stack
page read and write
19D000
stack
page read and write
69E000
heap
page read and write
746000
heap
page read and write
900000
heap
page read and write
8E0000
heap
page read and write
6EE000
stack
page read and write
401000
unkown
page execute and read and write
66D000
stack
page read and write
237F000
stack
page read and write
4E8000
heap
page read and write
8C4000
heap
page read and write
506000
heap
page read and write
728000
heap
page read and write
A90000
heap
page read and write
40E000
unkown
page write copy
720000
heap
page read and write
3A9F000
stack
page read and write
20DE000
stack
page read and write
40C000
unkown
page execute and read and write
99000
stack
page read and write
A4E000
stack
page read and write
18C000
stack
page read and write
21DF000
stack
page read and write
49E000
stack
page read and write
87E000
stack
page read and write
2580000
heap
page read and write
9A000
stack
page read and write
18E000
stack
page read and write
83D000
stack
page read and write
3EA0000
trusted library allocation
page read and write
8BE000
stack
page read and write
501000
heap
page read and write
45E000
stack
page read and write
40E000
unkown
page read and write
699000
heap
page read and write
401000
unkown
page execute and read and write
6F0000
heap
page read and write
6A5000
heap
page read and write
47AF000
stack
page read and write
8F0000
heap
page read and write
232E000
stack
page read and write
400000
unkown
page readonly
4510000
heap
page read and write
9E0000
heap
page read and write
4A0000
heap
page read and write
40A000
unkown
page execute and read and write
8FF000
stack
page read and write
3830000
heap
page read and write
21EE000
stack
page read and write
91F000
stack
page read and write
19D000
stack
page read and write
918000
heap
page read and write
6AA000
stack
page read and write
A09000
heap
page read and write
400000
unkown
page readonly
40D000
unkown
page execute and write copy
6A2000
heap
page read and write
880000
heap
page read and write
400000
unkown
page readonly
47EC000
stack
page read and write
A4E000
stack
page read and write
688000
heap
page read and write
40A000
unkown
page execute and read and write
542000
heap
page read and write
4A5000
heap
page read and write
52E000
stack
page read and write
40E000
unkown
page read and write
There are 151 hidden memdumps, click here to show them.