Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 14:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
patch.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
patch.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
patch.exe
-
Size
1.5MB
-
MD5
77920d26c517b7670d21859198690289
-
SHA1
4e11ae466191aa6218e89b776a7cd9f6c1526e53
-
SHA256
7910a7d842f4dde6ee10f1c13bb24a3377a506a5606d73c57481be51cd7de55c
-
SHA512
c7c8bf3d191c70b41b3216bee1c45bbfe9ed63735282a831b86adc045e1fef7a9523963ee6a016c22a51dddf4e3ef24db835db816b09d851982a99c4ef65dc2e
-
SSDEEP
24576:wk70TrcJwFfiabNLmOA9E76CgO8YeDYYtldv30T2aXTn8CTpriUtK1CmEBiYWq/V:wkQTAJwxb1mOA9E76CgXYkYYHdvybz8O
Score
7/10
Malware Config
Signatures
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4664-1-0x0000000005040000-0x00000000051D0000-memory.dmp net_reactor behavioral2/memory/4664-5-0x00000000057C0000-0x000000000594E000-memory.dmp net_reactor behavioral2/memory/4664-7-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-6-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-33-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-42-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-71-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-65-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-63-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-61-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-58-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-56-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-52-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-50-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-48-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-46-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-44-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-38-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-36-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-69-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-67-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-54-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-40-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-31-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-29-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-27-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-25-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-23-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-21-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-13-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-9-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-20-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-17-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-15-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor behavioral2/memory/4664-11-0x00000000057C0000-0x0000000005948000-memory.dmp net_reactor -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4664 patch.exe