Analysis
-
max time kernel
440s -
max time network
1165s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-02-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
MADARA.exe
Resource
win11-20240221-en
windows11-21h2-x64
2 signatures
1200 seconds
General
-
Target
MADARA.exe
-
Size
699KB
-
MD5
6f6809f59effeb683bf84b15dcf1c2c1
-
SHA1
100ba07752ecce8c98b980de2d6848445f058a0c
-
SHA256
c1bc0af0c55281609ceb3d51ca277ccc703b7b9acaef219a8dd22933c0ad3ff0
-
SHA512
ba2fd5746475398d59bfec006e036feaf4ffaf73d17698c02b16766a1e85bb590eb02f9f9a80cd04e54f828de2b32c18b3fe2ba4dbff634ddaba1f7f066bc56f
-
SSDEEP
12288:Kh1Lk70TnvjcHW06BoF6NobATJlLY8/zm58Iz/fFOeDDtZINWXKSaQA:uk70Trcd46bClh8z/9VDfc0KfQA
Score
7/10
Malware Config
Signatures
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2108-0-0x0000000004E70000-0x0000000004F3C000-memory.dmp net_reactor behavioral1/memory/2108-5-0x0000000004DA0000-0x0000000004E68000-memory.dmp net_reactor behavioral1/memory/2108-6-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-8-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-10-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-12-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-14-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-16-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-18-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-20-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-22-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-24-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-26-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-28-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-30-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-32-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-34-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-36-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-38-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-40-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-42-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-44-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-46-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-48-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-50-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-52-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-54-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-56-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-58-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-60-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-62-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-64-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-66-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-68-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor behavioral1/memory/2108-70-0x0000000004DA0000-0x0000000004E64000-memory.dmp net_reactor -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 MADARA.exe