Analysis
-
max time kernel
89s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 16:19
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20221111-en
General
-
Target
Setup.exe
-
Size
465.0MB
-
MD5
5c9eaedea9f8d3471e2b941fe3c1f790
-
SHA1
72e36c78cd8fd0ad6b98923943c76ff4db5926ce
-
SHA256
a7f33cf659584cb8d25e12291a510e206059a4a66aaafc884eea413e5ea7ed67
-
SHA512
a4c77155f7fc55e72da5005eb364680b892970f484e9228fb7f14064ddd9727ede778615b1c222ded20419699a47d1a83f39896ff829b227ec6784a80a9313d8
-
SSDEEP
49152:yUj5BJeqOnjDmNlqKxOnjDmNlqO/UzbPZHOnjDmNlq/z92:L2UMvSk
Malware Config
Extracted
raccoon
6039f7141434542f8fcbabcd7d82455d
http://83.217.11.27/
http://83.217.11.28/
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/1848-132-0x00000000005A0000-0x000000000077C000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 1848 set thread context of 2716 1848 Setup.exe Setup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Setup.exepid process 1848 Setup.exe 1848 Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Setup.exedescription pid process Token: SeDebugPrivilege 1848 Setup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Setup.exedescription pid process target process PID 1848 wrote to memory of 3556 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 3556 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 3556 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe PID 1848 wrote to memory of 2716 1848 Setup.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1848-132-0x00000000005A0000-0x000000000077C000-memory.dmpFilesize
1.9MB
-
memory/1848-133-0x0000000004F90000-0x000000000502C000-memory.dmpFilesize
624KB
-
memory/1848-134-0x00000000055E0000-0x0000000005B84000-memory.dmpFilesize
5.6MB
-
memory/1848-135-0x00000000050D0000-0x0000000005162000-memory.dmpFilesize
584KB
-
memory/1848-136-0x00000000050A0000-0x00000000050AA000-memory.dmpFilesize
40KB
-
memory/1848-137-0x00000000052C0000-0x0000000005316000-memory.dmpFilesize
344KB
-
memory/2716-139-0x0000000000000000-mapping.dmp
-
memory/2716-140-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2716-142-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2716-143-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3556-138-0x0000000000000000-mapping.dmp