Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
595KB
-
MD5
2060ab69656588e8acefcde9c7cc0a5f
-
SHA1
f4501b82e348b38cf4f877bff1c1447828585c6a
-
SHA256
b39f3c1533ff0a817a221ec313c11b926dfcc1b0e3a3a49fea5cb3151b094ee3
-
SHA512
10f3447e6cd5a065184395368825030951c62e6c59f980399f832b0862ae09d8db20b7557c4b25917ca78c92750dfb9654e5064fc860a5a6abff198574fa6573
-
SSDEEP
12288:ih1Fk70TnvjcWYbRQsBTNcHG2k+Nfw3HtUZwi+rRvoR9yrc4+GX:Mk70TrcWYbmsBxN2otUf+Yyrc0X
Score
7/10
Malware Config
Signatures
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/2040-2-0x0000000002240000-0x0000000002280000-memory.dmp net_reactor behavioral1/memory/2040-0-0x00000000022C0000-0x000000000233E000-memory.dmp net_reactor behavioral1/memory/2040-4-0x0000000002390000-0x000000000240C000-memory.dmp net_reactor -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2812 2040 WerFault.exe tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
tmp.exedescription pid process target process PID 2040 wrote to memory of 2812 2040 tmp.exe WerFault.exe PID 2040 wrote to memory of 2812 2040 tmp.exe WerFault.exe PID 2040 wrote to memory of 2812 2040 tmp.exe WerFault.exe PID 2040 wrote to memory of 2812 2040 tmp.exe WerFault.exe