Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
595KB
-
MD5
63d9528b6667199d22c482f15643ab31
-
SHA1
6b6ee0d6d1d661dc3806b653757c5fa8fbc7fd36
-
SHA256
7c94846904eeffd843980d64ba0eee3b8a81a52aeb60b5a5195bf7b426e4a443
-
SHA512
1bcf34c21d452db4212358d5ba10339b1d8c42ceda80741affdd54f2bc6dac876e10d72b583e7e7df65d47d9d4f95184b38f7b51963e82afba34d8540dc44e58
-
SSDEEP
12288:gh1Fk70TnvjcU72Em20lUIIgp05m/x979RE/UzIB8Irh:mk70TrcUSEHIIghREMyld
Malware Config
Extracted
Family
amadey
Version
4.17
C2
http://193.233.132.167
Attributes
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
rc4.plain
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/3572-0-0x0000000004C70000-0x0000000004CEE000-memory.dmp net_reactor behavioral2/memory/3572-6-0x0000000004D90000-0x0000000004E0E000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 3572 set thread context of 3324 3572 file.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 232 3324 WerFault.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
file.exedescription pid process target process PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe PID 3572 wrote to memory of 3324 3572 file.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 6003⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3324 -ip 33241⤵PID:1068