Analysis
-
max time kernel
1s -
max time network
50s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-02-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
Resource
win10-20231220-en
General
-
Target
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe
-
Size
698KB
-
MD5
bf2a3e48b0ea897e1cb01f8e2d37a995
-
SHA1
4e7cd01f8126099d550e126ff1c44b9f60f79b70
-
SHA256
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
-
SHA512
78769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
SSDEEP
12288:mh1Fk70TnvjcDopmEUd4+rL4VZvvApKFuzWMfJoacb7hj30Cq7rc4p/2:Ak70TrcDopfE+wUFuzW3NFgdrJx2
Malware Config
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/4528-5-0x00000000027E0000-0x0000000002878000-memory.dmp net_reactor behavioral2/memory/4528-0-0x0000000004C00000-0x0000000004C98000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exedescription pid process target process PID 4528 set thread context of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1164 3408 WerFault.exe RegAsm.exe 660 3408 WerFault.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exedescription pid process target process PID 4528 wrote to memory of 3384 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3384 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3384 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe PID 4528 wrote to memory of 3408 4528 207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe"C:\Users\Admin\AppData\Local\Temp\207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 11043⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 11923⤵
- Program crash
PID:660
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3384
-