Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe
Resource
win7-20230712-en
General
-
Target
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe
-
Size
1.7MB
-
MD5
1bcd409bc9efcd48dfbc3dbd26e0071c
-
SHA1
063c673744ab5787e0087b6602332d8f7a07e039
-
SHA256
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29
-
SHA512
257865a38693000563ee898b960ca41623b51136c786f7346de578d8c8647bfddf912fce44dcbfcdb9406e3a8f75ac36f05b3ccfe14d5f2f51f5097e02f1ed96
-
SSDEEP
24576:9Kk8YxJl1W4vfJnQBYxtbcR556Zcsn4slE83RwXXasZe3+yqkqBLU:0YxYkpQKQRuZccZJBwXXasZs+BkMLU
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/2188-134-0x0000000000160000-0x0000000000318000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exedescription pid process target process PID 2188 set thread context of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5104 1296 WerFault.exe MsBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exedescription pid process Token: SeDebugPrivilege 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exedescription pid process target process PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe PID 2188 wrote to memory of 1296 2188 515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe MsBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe"C:\Users\Admin\AppData\Local\Temp\515006e6eecad0418c6c3980a258dfc6e9f8ff8dacc801298b445c25017beb29.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 10683⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1296 -ip 12961⤵PID:1520