Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe
-
Size
729KB
-
MD5
4d651b2a8a6b64e94a95899f6b96cfdb
-
SHA1
d4a2f6134cd705c5b1e39e7ad9834d333272b921
-
SHA256
c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381
-
SHA512
c10137446cdce9d0d3b99a91fd404789659aeffd2f8524ddcb30776d8674d7e380b873be7b086236c6648c391fd75211afee1a6ba96fd1fb48e6c07ccede27bc
-
SSDEEP
12288:4h1Fk70Tnvjc343H98AI+djRA/9gdcumaN04mInO2+Dnr0qgGWGa8e/91uTc:Ok70Trc343H9rI+djYGeumaN1mInO2Uy
Score
9/10
Malware Config
Signatures
-
Detects executables packed with unregistered version of .NET Reactor 3 IoCs
resource yara_rule behavioral1/memory/2988-0-0x00000000049B0000-0x0000000004A4C000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2988-5-0x0000000004910000-0x00000000049AA000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2988-10-0x00000000048D0000-0x0000000004910000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
Program crash 1 IoCs
pid pid_target Process procid_target 2824 2988 WerFault.exe 17 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2824 2988 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2988 wrote to memory of 2824 2988 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2988 wrote to memory of 2824 2988 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29 PID 2988 wrote to memory of 2824 2988 c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe"C:\Users\Admin\AppData\Local\Temp\c10206561af98fa52ccc9d7c1e5ddc3d580713f2d80aab6acbe205c20020a381.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 5922⤵
- Program crash
PID:2824
-