Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
590ab7a834d9e93d7a7a70f68b7a6240_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
590ab7a834d9e93d7a7a70f68b7a6240_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
590ab7a834d9e93d7a7a70f68b7a6240_exe32.exe
-
Size
4.8MB
-
MD5
590ab7a834d9e93d7a7a70f68b7a6240
-
SHA1
d68d7da2943e6fddf640ccb8e487f8f8d7bba62d
-
SHA256
727b0046c09cfde6b77a306a11e6bb117f7b2a2740e26ca57dbb57a1b17893cd
-
SHA512
51e82b7a8239c2b2a810c75380771c3089fc122a3a260c48aeef3507a191ea7fe146c94352b216ed801535ee024ed04aa278c807e5064bbed92e3c630f70642f
-
SSDEEP
98304:SalQPMqpBBBBBBFBSBoUUYqBorEF/evgV9BuSP6qQXlksRzOZ9r7+sgyaZNHkJ83:SOQPnpBBBBBBFBanq2oF/egVPJP6Gs15
Malware Config
Signatures
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1616-2-0x0000000006760000-0x0000000007028000-memory.dmp net_reactor behavioral2/memory/1616-5-0x0000000008030000-0x00000000088F6000-memory.dmp net_reactor behavioral2/memory/1616-8-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-9-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-12-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-14-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-16-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-18-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-20-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-22-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-24-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-26-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-28-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-30-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-32-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-34-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-36-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-38-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-40-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-42-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-44-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-46-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-48-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-50-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-52-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-54-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-56-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-58-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-61-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-63-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-65-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-67-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-69-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-71-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor behavioral2/memory/1616-73-0x0000000008030000-0x00000000088F0000-memory.dmp net_reactor -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1616 590ab7a834d9e93d7a7a70f68b7a6240_exe32.exe