Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Professional Edition v1.1.6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Professional Edition v1.1.6.exe
Resource
win10v2004-20231215-en
Target
Professional Edition v1.1.6.exe
Size
62.8MB
MD5
006989be93060ed60903ad003b63d6ea
SHA1
c7f11d43854d053ed4419d3d0430b64b7464711a
SHA256
5ec2ba99b3abf37b98dc5efdceffe64703335b51f5934b04842d8bf2c4a31e81
SHA512
121e159e859eff23e80fcb50508cf1362ca8f1101b6f22f7aa4e3350d8fae5a5dee5066bbffabee862757238aa4ab0259bbce2358d2936910b68209bc8d3f5d3
SSDEEP
786432:z7A2IAlu57qsdu0xHun+kfj0Gl4RTdn9OZ4Ry:zk2s4Z0Gl4z9S
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource | yara_rule |
---|---|
sample | net_reactor |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RaiseException
FreeLibrary
RaiseFailFastException
GetExitCodeProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
MultiByteToWideChar
GetTickCount
GetCurrentProcessId
FlushInstructionCache
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedPushEntrySList
InterlockedFlushSList
InitializeSListHead
GetTickCount64
DuplicateHandle
QueueUserAPC
WaitForSingleObjectEx
SetThreadPriority
GetThreadPriority
ResumeThread
GetCurrentThreadId
TlsAlloc
GetCurrentThread
CreateThread
GetModuleHandleW
WaitForMultipleObjectsEx
SignalObjectAndWait
SetThreadStackGuarantee
VirtualQuery
WriteFile
GetStdHandle
GetConsoleOutputCP
MapViewOfFileEx
UnmapViewOfFile
GetStringTypeExW
SetEvent
GetCurrentProcessorNumber
GlobalMemoryStatusEx
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
InterlockedPopEntrySList
GetCurrentProcessorNumberEx
ExitProcess
Sleep
CreateMemoryResourceNotification
GetProcessAffinityMask
SetThreadIdealProcessorEx
GetThreadIdealProcessorEx
GetLargePageMinimum
VirtualUnlock
ResetWriteWatch
GetWriteWatch
GetLogicalProcessorInformation
SetThreadGroupAffinity
SetThreadAffinityMask
IsProcessInJob
QueryInformationJobObject
K32GetProcessMemoryInfo
VirtualAlloc
VirtualFree
VirtualProtect
SleepEx
SwitchToThread
CloseThreadpoolTimer
CreateThreadpoolTimer
SetThreadpoolTimer
ReadFile
GetFileSize
GetEnvironmentVariableW
SetEnvironmentVariableW
CreateEventW
ResetEvent
CreateSemaphoreExW
ReleaseSemaphore
CreateMutexW
ReleaseMutex
WaitForSingleObject
SuspendThread
SetThreadContext
GetEnabledXStateFeatures
InitializeContext
CopyContext
SetXStateFeaturesMask
WerRegisterRuntimeExceptionModule
GetSystemDefaultLCID
GetUserDefaultLCID
OutputDebugStringA
RtlUnwind
HeapAlloc
HeapFree
GetProcessHeap
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
FormatMessageW
GetACP
LCMapStringEx
LocalFree
VerSetConditionMask
VerifyVersionInfoW
IsWow64Process
QueryThreadCycleTime
VirtualAllocExNuma
GetNumaProcessorNodeEx
GetNumaHighestNodeNumber
GetSystemTimes
GetSystemTimeAsFileTime
GetModuleFileNameW
CreateProcessW
GetCPInfo
LoadLibraryExW
CreateFileW
GetFileAttributesExW
GetTempPathW
GetCurrentDirectoryW
GetFullPathNameW
LoadLibraryExA
OpenEventW
ExitThread
HeapReAlloc
CreateNamedPipeA
WaitForMultipleObjects
DisconnectNamedPipe
CreateFileA
CancelIoEx
GetOverlappedResult
ConnectNamedPipe
FlushFileBuffers
SetFilePointer
CreateFileMappingW
MapViewOfFile
GetActiveProcessorGroupCount
GetSystemTime
SetConsoleCtrlHandler
GetLocaleInfoEx
GetUserDefaultLocaleName
LoadLibraryW
CreateDirectoryW
RemoveDirectoryW
GetFileSizeEx
FindFirstFileExW
FindNextFileW
FindClose
LoadLibraryA
InitializeCriticalSectionAndSpinCount
CloseHandle
TlsSetValue
TlsGetValue
GetSystemInfo
GetCurrentProcess
ReadProcessMemory
OutputDebugStringW
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCommandLineW
GetProcAddress
GetModuleHandleExW
SetErrorMode
FlushProcessWriteBuffers
SetLastError
DebugBreak
GetLastError
GetThreadContext
WideCharToMultiByte
DecodePointer
InitializeCriticalSectionEx
IsProcessorFeaturePresent
EncodePointer
TlsFree
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetExitCodeThread
GetStringTypeW
CreateFileMappingA
RegGetValueW
SetKernelObjectSecurity
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
EventRegister
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
SetThreadToken
RevertToSelf
OpenThreadToken
EventWriteTransfer
EventWrite
CoTaskMemAlloc
CoTaskMemFree
CoWaitForMultipleHandles
IIDFromString
CLSIDFromProgID
CoGetMarshalSizeMax
CoCreateGuid
CoUnmarshalInterface
CoGetObjectContext
CoGetContextToken
CoGetClassObject
CoCreateFreeThreadedMarshaler
CreateStreamOnHGlobal
CoUninitialize
CoInitializeEx
CoMarshalInterface
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CoReleaseMarshalData
StringFromGUID2
SafeArrayAllocDescriptorEx
GetRecordInfoFromTypeInfo
SafeArraySetRecordInfo
SafeArrayAllocData
SafeArrayGetElemsize
VarCyFromDec
SysAllocStringByteLen
SafeArrayCreateVector
SafeArrayPutElement
LoadRegTypeLi
CreateErrorInfo
SysStringByteLen
SysFreeString
GetErrorInfo
VariantInit
SetErrorInfo
VariantClear
VariantChangeTypeEx
VariantChangeType
SafeArrayGetVartype
LoadTypeLibEx
QueryPathOfRegTypeLi
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetDim
SysAllocStringLen
SysAllocString
SysStringLen
LoadStringW
MessageBoxW
ShellExecuteW
strcmp
iswupper
towlower
isalpha
isdigit
wcstok_s
strnlen
_wcsnicmp
iswascii
towupper
wcscat_s
strlen
wcscpy_s
wcsncat_s
strncat_s
iswspace
wcsncpy_s
strcspn
_wcsicmp
strcpy_s
isupper
strcat_s
strncpy_s
_wcsdup
_strnicmp
strncmp
islower
toupper
strtok_s
isspace
_strdup
__strncnt
_stricmp
wcsnlen
tolower
wcsncmp
fclose
_wfopen
_flushall
fseek
__stdio_common_vswprintf
__stdio_common_vfwprintf
__p__commode
fgets
_set_fmode
fputws
fputwc
__stdio_common_vsscanf
_get_stream_buffer_pointers
ftell
_fseeki64
fread
fsetpos
ungetc
_fileno
_dup
fgetpos
_setmode
setvbuf
_wfsopen
__stdio_common_vfprintf
fopen
fwrite
__stdio_common_vsnwprintf_s
__stdio_common_vsprintf_s
fgetc
__acrt_iob_func
fflush
fputs
fputc
__stdio_common_vsnprintf_s
terminate
_errno
_beginthreadex
_invalid_parameter_noinfo_noreturn
_controlfp_s
_invalid_parameter_noinfo
_register_thread_local_exe_atexit_callback
_c_exit
__p___wargv
__p___argc
abort
exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_wcserror_s
_configure_wide_argv
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
_exit
atol
strtoull
atoi
_itow_s
_wtoi
_ltow_s
wcstoul
strtoul
_wcstoui64
free
realloc
calloc
malloc
_set_new_mode
qsort
__libm_sse2_asin
__libm_sse2_acos
_CItanh
_CIsinh
_CIfmod
_CIcosh
_CIatan2
__libm_sse2_atan2
__libm_sse2_cos
log2
atanh
acosh
cbrt
__libm_sse2_exp
asinhf
atanhf
cbrtf
acoshf
log2f
ceil
floor
__libm_sse2_log
_isnan
__libm_sse2_log10
__libm_sse2_pow
__libm_sse2_sin
__libm_sse2_tan
_fdopen
_libm_sse2_acos_precise
_libm_sse2_asin_precise
trunc
truncf
ilogb
ilogbf
_finite
_libm_sse2_atan_precise
_libm_sse2_cos_precise
_copysign
modf
_libm_sse2_tan_precise
frexp
_libm_sse2_exp_precise
_libm_sse2_log10_precise
__libm_sse2_atan
fma
_libm_sse2_log_precise
_libm_sse2_sqrt_precise
_libm_sse2_sin_precise
asinh
fmaf
_libm_sse2_pow_precise
__setusermatherr
wcsftime
_gmtime64_s
_time64
getenv
_configthreadlocale
_unlock_locales
__pctype_func
___lc_locale_name_func
___lc_codepage_func
___mb_cur_max_func
_lock_locales
localeconv
setlocale
_lock_file
_unlock_file
_wremove
_wrename
CLRJitAttachState
DotNetRuntimeInfo
MetaDataGetDispenser
g_CLREngineMetrics
g_dacTable
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ