Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
Resource
win10-20231220-en
General
-
Target
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
-
Size
698KB
-
MD5
bf2a3e48b0ea897e1cb01f8e2d37a995
-
SHA1
4e7cd01f8126099d550e126ff1c44b9f60f79b70
-
SHA256
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
-
SHA512
78769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
SSDEEP
12288:mh1Fk70TnvjcDopmEUd4+rL4VZvvApKFuzWMfJoacb7hj30Cq7rc4p/2:Ak70TrcDopfE+wUFuzW3NFgdrJx2
Malware Config
Signatures
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/1984-0-0x0000000004880000-0x0000000004918000-memory.dmp net_reactor behavioral1/memory/1984-3-0x0000000004A00000-0x0000000004A40000-memory.dmp net_reactor behavioral1/memory/1984-4-0x00000000021D0000-0x0000000002268000-memory.dmp net_reactor -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2120 1984 WerFault.exe 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exedescription pid process target process PID 1984 wrote to memory of 2120 1984 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe WerFault.exe PID 1984 wrote to memory of 2120 1984 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe WerFault.exe PID 1984 wrote to memory of 2120 1984 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe WerFault.exe PID 1984 wrote to memory of 2120 1984 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe"C:\Users\Admin\AppData\Local\Temp\207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 6002⤵
- Program crash
PID:2120
-