Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
4857ac12eaa8cc23cc3ec9582c5cef90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4857ac12eaa8cc23cc3ec9582c5cef90N.exe
Resource
win10v2004-20240802-en
General
-
Target
4857ac12eaa8cc23cc3ec9582c5cef90N.exe
-
Size
384KB
-
MD5
4857ac12eaa8cc23cc3ec9582c5cef90
-
SHA1
3a55b75519f76715d9f5bbd114c9b79bd1c57a4b
-
SHA256
33edaf7ecf57fc15b1e7879ed312408ea8373232ddae7a66992dfcec9689e06b
-
SHA512
42d3bc79df1ad08969d27442f9b218e2eb0874edc57e6a3dff6ca030faad8d10927adcda74cd30a6f4c7ab021669e13dad5bfb5af0110bde62de2ffc8129cb96
-
SSDEEP
12288:oh1Lk70TnvjcM9OZ5aX7vgBp6kypBdbqkE+w:0k70TrcMceX7Q6kuBBy+w
Malware Config
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/768-1-0x0000000004840000-0x00000000048CC000-memory.dmp net_reactor behavioral1/memory/768-3-0x0000000004730000-0x00000000047BA000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4857ac12eaa8cc23cc3ec9582c5cef90N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 768 4857ac12eaa8cc23cc3ec9582c5cef90N.exe