Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 09:04
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
6.0MB
-
MD5
0c299719b5de524a7694f553e7958334
-
SHA1
ccf292e8b79dc4c0a82bfa45117f4fe660bf58ac
-
SHA256
152515d944171b93908d577c7497dec57bbac78f18df0cb5e094b590d397dfa8
-
SHA512
1f8182c6313f2d084057af81f4a2d60ef401f6a1aad8a0815b95ff9425676c81cfadadd862b521ad877bcd1770c576d20a0f8f0d1f5ac68087dbbd655e272f0c
-
SSDEEP
49152:3w3U0rW+RzXtpR548WTt9kUHdvAmZL0Th+1n9fr2flQChRigKwQw3UvSACGrW+Rw:1sH4JErh0gzyxL
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/1740-54-0x0000000000320000-0x0000000000928000-memory.dmp net_reactor -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1740-54-0x0000000000320000-0x0000000000928000-memory.dmp agile_net -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1600 1740 WerFault.exe tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 1740 tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
tmp.exedescription pid process target process PID 1740 wrote to memory of 1600 1740 tmp.exe WerFault.exe PID 1740 wrote to memory of 1600 1740 tmp.exe WerFault.exe PID 1740 wrote to memory of 1600 1740 tmp.exe WerFault.exe PID 1740 wrote to memory of 1600 1740 tmp.exe WerFault.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1740-54-0x0000000000320000-0x0000000000928000-memory.dmpFilesize
6.0MB