Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 16:01
Static task
static1
Behavioral task
behavioral1
Sample
13466b8937f308d44a934e576cfc3075.bin.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
13466b8937f308d44a934e576cfc3075.bin.exe
Resource
win10v2004-20230703-en
General
-
Target
13466b8937f308d44a934e576cfc3075.bin.exe
-
Size
2.0MB
-
MD5
13466b8937f308d44a934e576cfc3075
-
SHA1
2c62e7187b10abcf18dfaaab72177e271b7a7b7d
-
SHA256
bc22a0e87e9ffae8c2aa04a35879be6f5fbef9da24897b9c00ea0fa28ae7a5f5
-
SHA512
b2a80e0811a6e6194388ca6d875e8e55b02c1151696f8641ab131af6be3b0931b4484da142ce313d65088ea15aaec625c47ca622912762b62b869553aab7c435
-
SSDEEP
49152:hkQTA2oTmoJqPuV24D7ViZRaQ6xn4px43Bo60mUgoe:ha2sRJ8uf3Vi+QY4px43Bo3mUgoe
Malware Config
Signatures
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2100-56-0x0000000005310000-0x0000000005656000-memory.dmp net_reactor behavioral1/memory/2100-59-0x0000000004FD0000-0x0000000005314000-memory.dmp net_reactor behavioral1/memory/2100-60-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-61-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-63-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-67-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-65-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-72-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-74-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-78-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-76-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-80-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-82-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-84-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-86-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-88-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-90-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-92-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-94-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-96-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-98-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-100-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-102-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-104-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-106-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-108-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-112-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-110-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-126-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-124-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-122-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-120-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-118-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-116-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor behavioral1/memory/2100-114-0x0000000004FD0000-0x000000000530F000-memory.dmp net_reactor -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 13466b8937f308d44a934e576cfc3075.bin.exe