Analysis
-
max time kernel
132s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 23:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
38531b2b0413ec8925c2ab8d9755d24b.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
38531b2b0413ec8925c2ab8d9755d24b.exe
-
Size
230KB
-
MD5
38531b2b0413ec8925c2ab8d9755d24b
-
SHA1
fd6e9de1c60a58d9983e4bbdd04c9ab332d79bd4
-
SHA256
bab5cb442f212e03bc6d19c77077ac79f7cf27d1f28f5857702e390a9ba70f77
-
SHA512
f5395e839f1ee8e4214be12184fc75dc8765600b7a0f925592d301f3089395de56c1df507099bf2c1137173140c752c8cd63ee30639b584f6b1184f8d3d94ec1
-
SSDEEP
3072:YDKW1LgppLRHMY0TBfJvjcTp5XvXgOmEaRSzv24OhHNB6qfXV0mkbRYV:YDKW1Lgbdl0TBBvjc/ME6LLzgq94o
Malware Config
Signatures
-
Async RAT payload 34 IoCs
Processes:
resource yara_rule behavioral2/memory/552-4-0x0000000004AE0000-0x0000000004B10000-memory.dmp family_asyncrat behavioral2/memory/552-33-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-24-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-41-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-70-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-68-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-66-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-62-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-60-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-58-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-54-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-50-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-48-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-46-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-45-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-42-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-38-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-35-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-64-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-56-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-52-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-31-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-29-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-27-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-25-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-21-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-19-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-17-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-15-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-11-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-13-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-9-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-7-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat behavioral2/memory/552-6-0x0000000004AE0000-0x0000000004B0A000-memory.dmp family_asyncrat -
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/552-1-0x0000000002200000-0x0000000002232000-memory.dmp net_reactor behavioral2/memory/552-4-0x0000000004AE0000-0x0000000004B10000-memory.dmp net_reactor behavioral2/memory/552-33-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-24-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-41-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-70-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-68-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-66-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-62-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-60-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-58-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-54-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-50-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-48-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-46-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-45-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-42-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-38-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-35-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-64-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-56-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-52-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-31-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-29-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-27-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-25-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-21-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-19-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-17-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-15-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-11-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-13-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-9-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-7-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor behavioral2/memory/552-6-0x0000000004AE0000-0x0000000004B0A000-memory.dmp net_reactor -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4452 552 WerFault.exe 38531b2b0413ec8925c2ab8d9755d24b.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
38531b2b0413ec8925c2ab8d9755d24b.exedescription pid process Token: SeDebugPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeIncreaseQuotaPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSecurityPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeTakeOwnershipPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeLoadDriverPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemProfilePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemtimePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeProfSingleProcessPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeIncBasePriorityPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeCreatePagefilePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeBackupPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeRestorePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeShutdownPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeDebugPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemEnvironmentPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeRemoteShutdownPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeUndockPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeManageVolumePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 33 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 34 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 35 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 36 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeIncreaseQuotaPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSecurityPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeTakeOwnershipPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeLoadDriverPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemProfilePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemtimePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeProfSingleProcessPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeIncBasePriorityPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeCreatePagefilePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeBackupPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeRestorePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeShutdownPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeDebugPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeSystemEnvironmentPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeRemoteShutdownPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeUndockPrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: SeManageVolumePrivilege 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 33 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 34 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 35 552 38531b2b0413ec8925c2ab8d9755d24b.exe Token: 36 552 38531b2b0413ec8925c2ab8d9755d24b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38531b2b0413ec8925c2ab8d9755d24b.exe"C:\Users\Admin\AppData\Local\Temp\38531b2b0413ec8925c2ab8d9755d24b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 13482⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 552 -ip 5521⤵PID:4804