Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 05:11
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
4.5MB
-
MD5
606a90b307b8a88a0475284eea783b72
-
SHA1
fa9d423b8fff7d439c124747c00864b2aabfca9d
-
SHA256
1e03bac7dfde9ffd41c54be387a18a27a87d38267f1dbec5f5c9da13babb9440
-
SHA512
4525cec01bedf2edc5b4dbdee31839c49731c002d937a4c1084c95cd6667e59a3a5af38940f57f1449c3663f5cc44c13519806fc3550813d15c3dd20ed8a1fb4
-
SSDEEP
98304:UaGJJUHWId9YsqjuwLaCPG5+uGss/rCCwILBfUbrGuJtH1O/K:UjWWIdKyw5iGssT7fsimtHI/K
Score
7/10
Malware Config
Signatures
-
.NET Reactor proctector 33 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2980-137-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-138-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-140-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-142-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-144-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-146-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-148-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-150-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-152-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-154-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-156-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-158-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-160-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-162-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-164-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-166-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-168-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-171-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-173-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-175-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-177-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-179-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-181-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-183-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-185-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-187-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-189-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-191-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-193-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-195-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-197-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-200-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor behavioral2/memory/2980-202-0x0000000005AC0000-0x000000000600F000-memory.dmp net_reactor -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 tmp.exe