Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
595KB
-
MD5
2060ab69656588e8acefcde9c7cc0a5f
-
SHA1
f4501b82e348b38cf4f877bff1c1447828585c6a
-
SHA256
b39f3c1533ff0a817a221ec313c11b926dfcc1b0e3a3a49fea5cb3151b094ee3
-
SHA512
10f3447e6cd5a065184395368825030951c62e6c59f980399f832b0862ae09d8db20b7557c4b25917ca78c92750dfb9654e5064fc860a5a6abff198574fa6573
-
SSDEEP
12288:ih1Fk70TnvjcWYbRQsBTNcHG2k+Nfw3HtUZwi+rRvoR9yrc4+GX:Mk70TrcWYbmsBxN2otUf+Yyrc0X
Malware Config
Extracted
Family
amadey
Version
4.17
C2
http://193.233.132.167
Attributes
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
rc4.plain
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/2440-0-0x0000000002730000-0x00000000027AE000-memory.dmp net_reactor behavioral2/memory/2440-6-0x0000000004DE0000-0x0000000004E5C000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid Process procid_target PID 2440 set thread context of 1864 2440 tmp.exe 88 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4460 1864 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
tmp.exedescription pid Process procid_target PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88 PID 2440 wrote to memory of 1864 2440 tmp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 6203⤵
- Program crash
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1864 -ip 18641⤵PID:2772