Analysis
-
max time kernel
95s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
595KB
-
MD5
2060ab69656588e8acefcde9c7cc0a5f
-
SHA1
f4501b82e348b38cf4f877bff1c1447828585c6a
-
SHA256
b39f3c1533ff0a817a221ec313c11b926dfcc1b0e3a3a49fea5cb3151b094ee3
-
SHA512
10f3447e6cd5a065184395368825030951c62e6c59f980399f832b0862ae09d8db20b7557c4b25917ca78c92750dfb9654e5064fc860a5a6abff198574fa6573
-
SSDEEP
12288:ih1Fk70TnvjcWYbRQsBTNcHG2k+Nfw3HtUZwi+rRvoR9yrc4+GX:Mk70TrcWYbmsBxN2otUf+Yyrc0X
Malware Config
Extracted
Family
amadey
Version
4.17
C2
http://193.233.132.167
Attributes
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
rc4.plain
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/2804-0-0x0000000002840000-0x00000000028BE000-memory.dmp net_reactor behavioral2/memory/2804-6-0x00000000053F0000-0x000000000546C000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 2804 set thread context of 2892 2804 tmp.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4768 2892 WerFault.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
tmp.exedescription pid process target process PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe PID 2804 wrote to memory of 2892 2804 tmp.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 5963⤵
- Program crash
PID:4768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2892 -ip 28921⤵PID:3968