IOC Report
Label.exe

loading gif

Files

File Path
Type
Category
Malicious
Label.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\Label.exe
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp
GIF image data, version 89a, 20545 x 7507
dropped
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp-
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp~
data
dropped
C:\Users\user\AppData\Local\Temp\~E52D1ACF.tmp
Zip archive data, at least v2.0 to extract, compression method=store
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Label.exe
"C:\Users\user\Desktop\Label.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c ping -n 3 127.0.0.1 >NUL & echo EEEE > "C:\Users\user\Desktop\Label.exe"
malicious
C:\Windows\System32\PING.EXE
ping -n 3 127.0.0.1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
25D1000
heap
page read and write
140000000
unkown
page readonly
4B4000
heap
page read and write
6DE000
stack
page read and write
48C000
heap
page read and write
61185FF000
stack
page read and write
22E557E5000
heap
page read and write
2B0F000
stack
page read and write
49A000
heap
page read and write
1401AF000
unkown
page read and write
1D0000
heap
page read and write
290E000
stack
page read and write
140000000
unkown
page readonly
140278000
unkown
page readonly
4BC000
heap
page read and write
25D7000
heap
page read and write
416000
heap
page read and write
140260000
unkown
page read and write
2C0C000
stack
page read and write
190000
heap
page read and write
61184FF000
unkown
page read and write
611817C000
stack
page read and write
120000
stack
page read and write
2035000
heap
page read and write
22E55A80000
heap
page read and write
140001000
unkown
page execute read
1FC1000
direct allocation
page execute and read and write
2014000
direct allocation
page execute and read and write
1401AF000
unkown
page write copy
140001000
unkown
page execute read
140250000
unkown
page read and write
25D0000
heap
page read and write
22E557A0000
heap
page read and write
213F000
stack
page read and write
487000
heap
page read and write
140262000
unkown
page readonly
22E557CA000
heap
page read and write
22E55A85000
heap
page read and write
140262000
unkown
page readonly
1A0000
heap
page read and write
49A000
heap
page read and write
22E55990000
heap
page read and write
25D1000
heap
page read and write
25CF000
stack
page read and write
140278000
unkown
page readonly
22E557C0000
heap
page read and write
410000
heap
page read and write
2030000
heap
page read and write
487000
heap
page read and write
22E55790000
heap
page read and write
4B7000
heap
page read and write
140251000
unkown
page write copy
22E55A90000
heap
page read and write
44B000
heap
page read and write
7DE000
stack
page read and write
41B000
heap
page read and write
2180000
heap
page read and write
1F80000
direct allocation
page execute and read and write
49E000
heap
page read and write
48B000
heap
page read and write
25E9000
heap
page read and write
14024F000
unkown
page write copy
2A0E000
stack
page read and write
22E557E6000
heap
page read and write
There are 54 hidden memdumps, click here to show them.