Resubmissions

01-10-2024 16:24

241001-twvynayfpr 10

27-09-2024 00:57

240927-bawzqaxamj 10

26-09-2024 23:29

240926-3gqj3awfpc 10

26-09-2024 18:54

240926-xkc59avhjh 10

26-09-2024 18:38

240926-w945lavbqe 10

26-09-2024 16:26

240926-txsvpazdng 10

Analysis

  • max time kernel
    443s
  • max time network
    446s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-09-2024 16:26

General

  • Target

    Anarchy Panel.exe

  • Size

    54.6MB

  • MD5

    94bac1a0cc0dbac256f0d3b4c90648c2

  • SHA1

    4abcb8a31881e88322f6a37cbb24a14a80c6eef2

  • SHA256

    50c2dba1d961e09cb8df397b71bd3b6a32d0ee6dbe886e7309305dc4ba968f94

  • SHA512

    30ecee38d5d641abaf73e09a23c614cb3b8b84aa1f8ff1818e92c1f2b51bf6841d3e51564aecb5efd01a3d98db88f0938e7dd4ee9c74ca5477785c33c969ffd9

  • SSDEEP

    786432:RvcKHU1yll1EcgYwm/7hPo9b9DMs2PTUpRYj:lPU4bZwm/NwEIYj

Score
7/10

Malware Config

Signatures

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Anarchy Panel.exe
    "C:\Users\Admin\AppData\Local\Temp\Anarchy Panel.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1456
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4080

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Costura\C5730A4C0FDD612A5678E51A536CE09E\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      56a504a34d2cfbfc7eaa2b68e34af8ad

      SHA1

      426b48b0f3b691e3bb29f465aed9b936f29fc8cc

      SHA256

      9309fb2a3f326d0f2cc3f2ab837cfd02e4f8cb6b923b3b2be265591fd38f4961

      SHA512

      170c3645083d869e2368ee16325d7edaeba2d8f1d3d4a6a1054cfdd8616e03073772eeae30c8f79a93173825f83891e7b0e4fd89ef416808359f715a641747d7

    • memory/1456-15-0x00007FF81E353000-0x00007FF81E355000-memory.dmp

      Filesize

      8KB

    • memory/1456-3-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-17-0x0000000023C60000-0x0000000023EB2000-memory.dmp

      Filesize

      2.3MB

    • memory/1456-18-0x00000000244A0000-0x00000000245EE000-memory.dmp

      Filesize

      1.3MB

    • memory/1456-8-0x0000000004E50000-0x0000000004E62000-memory.dmp

      Filesize

      72KB

    • memory/1456-9-0x0000000020460000-0x0000000020A48000-memory.dmp

      Filesize

      5.9MB

    • memory/1456-10-0x0000000020A50000-0x0000000020E10000-memory.dmp

      Filesize

      3.8MB

    • memory/1456-11-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-12-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-13-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-14-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-0-0x00007FF81E353000-0x00007FF81E355000-memory.dmp

      Filesize

      8KB

    • memory/1456-38-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-2-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-1-0x0000000000E40000-0x00000000044DE000-memory.dmp

      Filesize

      54.6MB

    • memory/1456-19-0x0000000024740000-0x0000000024754000-memory.dmp

      Filesize

      80KB

    • memory/1456-20-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-21-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-22-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-23-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-24-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-25-0x0000000024900000-0x0000000024912000-memory.dmp

      Filesize

      72KB

    • memory/1456-26-0x0000000026030000-0x00000000262A8000-memory.dmp

      Filesize

      2.5MB

    • memory/1456-32-0x0000000020E20000-0x0000000020E2A000-memory.dmp

      Filesize

      40KB

    • memory/1456-37-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB

    • memory/1456-16-0x00007FF81E350000-0x00007FF81EE12000-memory.dmp

      Filesize

      10.8MB