Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe
-
Size
729KB
-
MD5
4d651b2a8a6b64e94a95899f6b96cfdb
-
SHA1
d4a2f6134cd705c5b1e39e7ad9834d333272b921
-
SHA256
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381
-
SHA512
c10137446cdce9d0d3b99a91fd404789659aeffd2f8524ddcb30776d8674d7e380b873be7b086236c6648c391fd75211afee1a6ba96fd1fb48e6c07ccede27bc
-
SSDEEP
12288:4h1Fk70Tnvjc343H98AI+djRA/9gdcumaN04mInO2+Dnr0qgGWGa8e/91uTc:Ok70Trc343H9rI+djYGeumaN1mInO2Uy
Score
9/10
Malware Config
Signatures
-
Detects executables packed with unregistered version of .NET Reactor 3 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000004A40000-0x0000000004ADC000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2028-2-0x0000000004A00000-0x0000000004A40000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2028-5-0x00000000022C0000-0x000000000235A000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
Program crash 1 IoCs
pid pid_target Process procid_target 2664 2028 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2664 2028 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2028 wrote to memory of 2664 2028 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2028 wrote to memory of 2664 2028 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2028 wrote to memory of 2664 2028 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe"C:\Users\Admin\AppData\Local\Temp\c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 5962⤵
- Program crash
PID:2664
-