Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
2120c3f031d7fb52761ba252870d5990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2120c3f031d7fb52761ba252870d5990N.exe
Resource
win10v2004-20240802-en
General
-
Target
2120c3f031d7fb52761ba252870d5990N.exe
-
Size
5.1MB
-
MD5
2120c3f031d7fb52761ba252870d5990
-
SHA1
7b6806b11be12063e81d5cbe270edd23c5441998
-
SHA256
aabeec16735d0282184052fb4cd60612460f85bf4398d2ea998a7fd0d49f2288
-
SHA512
de726844fa87d66d6c7ce297cfe692131e94651fa48073d755ca19353853ca80cd3c0c97d06c4f01ac69119016bd570aaf677a5ba7239bde60491dba786d20ee
-
SSDEEP
24576:5rc8Svg5GTdeww/MRvUtyfaFVIefE4A4HXvcrZLMpsWM4RjmcPhL+HQ/jzuVMCtJ:piTq/MGuKIh+XMCa7cO8NlaVeuHF
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4900-1-0x0000000000D90000-0x00000000012B2000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2120c3f031d7fb52761ba252870d5990N.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe 4900 2120c3f031d7fb52761ba252870d5990N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 2120c3f031d7fb52761ba252870d5990N.exe