IOC Report
12.exe

loading gif

Files

File Path
Type
Category
Malicious
12.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\RSADecryptKey\ID.DAT
ASCII text, with no line terminators
dropped
C:\RSADecryptKey\KEY.DAT
data
dropped
C:\RSADecryptKey\KEY.txt
very short file (no magic)
dropped
C:\RSADecryptKey\Public.txt
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\12.exe
"C:\Users\user\Desktop\12.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://t.me/mamondec1-Com
unknown
https://t.me/mamondec
unknown
https://t.me/mamondecDOq
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
790000
heap
page read and write
FCB000
unkown
page read and write
FC3000
unkown
page write copy
EE0000
unkown
page readonly
FC3000
unkown
page read and write
760000
heap
page read and write
79A000
heap
page read and write
FC4000
unkown
page write copy
7B7000
heap
page read and write
F95000
unkown
page readonly
FC5000
unkown
page read and write
740000
heap
page read and write
FC9000
unkown
page read and write
EE1000
unkown
page execute read
79E000
heap
page read and write
FC6000
unkown
page write copy
6FB000
stack
page read and write
3DD000
stack
page read and write
EE0000
unkown
page readonly
FCD000
unkown
page readonly
750000
heap
page readonly
EE1000
unkown
page execute read
F95000
unkown
page readonly
7C4000
heap
page read and write
FCD000
unkown
page readonly
780000
heap
page read and write
770000
heap
page read and write
BE0000
heap
page read and write
7AD000
heap
page read and write
775000
heap
page read and write
There are 20 hidden memdumps, click here to show them.