Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
7quarantine...XS.exe
windows7-x64
10quarantine...XS.exe
windows10-2004-x64
10quarantine...q7.exe
windows7-x64
5quarantine...q7.exe
windows10-2004-x64
5quarantine...yQ.exe
windows7-x64
7quarantine...yQ.exe
windows10-2004-x64
7quarantine...Nv.exe
windows7-x64
10quarantine...Nv.exe
windows10-2004-x64
10quarantine...TI.exe
windows7-x64
10quarantine...TI.exe
windows10-2004-x64
10quarantine...08.exe
windows7-x64
3quarantine...08.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
quarantine/27JinXS.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
quarantine/27JinXS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/DVaKyq7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/DVaKyq7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/FydOzyQ.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/FydOzyQ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/mAtJWNv.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/mAtJWNv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/systemPTI.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/systemPTI.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/uW8i508.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/uW8i508.exe
Resource
win10v2004-20250217-en
Target
quarantine.7z
Size
4.7MB
MD5
986fe9a6e87749f8f19260e66d0b8c75
SHA1
a63da135100b3ccc31af1c2671a2a424569dcfd7
SHA256
dc4ad0f2c1cd5d827404926ee01e96b5fa78f21f23abd67f33194247547133f4
SHA512
3aa4ec8b5db3ee088745bf0a414ed72a318dddfa8c26a351d50058f3bbec77740d316dc714ffeedb565d6c0072e1d86e9d4365773ceac914e334cf68583637d4
SSDEEP
98304:qZn2QpBTD2uyley/mH2Ee9i/desK7xjmS9WhsWF5g5ks5YLdrlbUwh:qkQpBTCLj/mu4/deJgSIhsUg52LDowh
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource | yara_rule |
---|---|
static1/unpack001/quarantine/FydOzyQ.exe | net_reactor |
static1/unpack001/quarantine/mAtJWNv.exe | net_reactor |
Checks for missing Authenticode signature.
resource |
---|
unpack001/quarantine/DVaKyq7.exe |
unpack001/quarantine/FydOzyQ.exe |
unpack001/quarantine/mAtJWNv.exe |
unpack001/quarantine/uW8i508.exe |
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcpy
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcpy
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\AdminC6\Workspace\1741568240\Project\Debug\Project.pdb
PdhComputeCounterStatistics
PdhBrowseCountersHW
PdhCollectQueryDataEx
PdhCloseLog
PdhBrowseCountersW
PdhCollectQueryDataWithTime
PdhCalculateCounterFromRawValue
PdhCloseQuery
PdhCollectQueryData
CloseHandle
DecodePointer
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileSizeEx
HeapQueryInformation
HeapSize
HeapReAlloc
LCMapStringW
GetStdHandle
GetCommandLineW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
GetFullPathNameW
GetTempFileNameW
ReadFile
WriteFile
DebugBreak
DebugActiveProcess
DebugActiveProcessStop
RaiseException
GetLastError
AddVectoredExceptionHandler
GetProcessHeap
AcquireSRWLockExclusive
AcquireSRWLockShared
ReleaseMutex
OpenMutexW
OpenEventW
SetWaitableTimer
Sleep
CreateSemaphoreW
CreateWaitableTimerW
GetCurrentProcess
GetCurrentProcessId
CreateThread
CreateRemoteThread
GetCurrentThreadId
CreateProcessW
GetSystemDirectoryA
GetSystemDirectoryW
VirtualProtect
OpenFileMappingW
CreateTimerQueue
CreateTimerQueueTimer
ReleaseMutexWhenCallbackReturns
OpenJobObjectW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
AddSIDToBoundaryDescriptor
DebugSetProcessKillOnExit
DebugBreakProcess
CreateTapePartition
GetTapeStatus
OpenFile
AddAtomW
CopyFileW
SetVolumeLabelW
SetVolumeMountPointW
DeactivateActCtx
OpenFileById
SetUserGeoID
ReadConsoleInputW
ReadConsoleW
ReadConsoleOutputCharacterW
ReadConsoleOutputAttribute
ReadConsoleOutputW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThread
SetConsoleCtrlHandler
WriteConsoleW
OutputDebugStringW
GetFileType
GetCommandLineA
GetSystemInfo
HeapValidate
ExitProcess
GetModuleHandleExW
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
RtlUnwind
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
GetProcAddress
FreeLibrary
VirtualQuery
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTempPathW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
LoadCursorW
SetWindowsHookExW
SetWindowLongW
ClientToScreen
GetCursorPos
MessageBoxW
AdjustWindowRectEx
AdjustWindowRect
SetWindowTextW
SetWindowRgn
SetMenuItemInfoW
TrackPopupMenu
AppendMenuW
DestroyMenu
CreatePopupMenu
GetActiveWindow
CharUpperW
AddClipboardFormatListener
OpenClipboard
SendDlgItemMessageW
IsDlgButtonChecked
CheckDlgButton
GetDlgItemTextW
GetDlgItem
SetWindowPos
OpenIcon
SendMessageW
SetUserObjectInformationW
OpenInputDesktop
OpenDesktopW
ActivateKeyboardLayout
wsprintfW
LoadIconW
SetWindowPlacement
AddPrintProvidorW
AddPrinterConnectionW
AddPortW
AddMonitorW
AddFormW
AddJobW
AbortPrinter
AddPrintProcessorW
AddPrinterDriverExW
AddPrinterDriverW
AddPrinterW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ