Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 14:32

General

  • Target

    Temp/Loader.exe

  • Size

    196KB

  • MD5

    6a793f140af7750f767c8710f1876dc7

  • SHA1

    ca3c1e4e8063f97b5241e7d717ec555ba42fdfa6

  • SHA256

    9fff2dedf36d298a9feee490a6f75add32aba917090c8bc4168f3319ab02b58b

  • SHA512

    f6e61f4568ecbda7d59837e3476446eaa0cd0a64789373de543a303fba9129055acc60e543af6db26105e610f77c7e8c05e3c0fdfac027914e295cd6633652a6

  • SSDEEP

    6144:GtKeofUmu0iEzeGANAf6+TcprHEBmDIx26W/MoaBPMwfs7PW7Lf/tv8p5cSrDewC:GseofUmu0iEzeGANAf6+TcprHEBmDIxN

Score
7/10

Malware Config

Signatures

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Temp\Loader.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2012-1-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-0-0x0000000000C40000-0x0000000000C78000-memory.dmp

    Filesize

    224KB

  • memory/2012-2-0x00000000050B0000-0x00000000050F0000-memory.dmp

    Filesize

    256KB

  • memory/2012-3-0x00000000050F0000-0x000000000523E000-memory.dmp

    Filesize

    1.3MB

  • memory/2012-4-0x0000000000480000-0x0000000000494000-memory.dmp

    Filesize

    80KB

  • memory/2012-5-0x00000000050B0000-0x00000000050F0000-memory.dmp

    Filesize

    256KB

  • memory/2012-6-0x00000000050B0000-0x00000000050F0000-memory.dmp

    Filesize

    256KB

  • memory/2012-7-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB