Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 15:00
Static task
static1
Behavioral task
behavioral1
Sample
b4e35341633082e70253b945cafb08df.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
b4e35341633082e70253b945cafb08df.dll
-
Size
848KB
-
MD5
b4e35341633082e70253b945cafb08df
-
SHA1
e7ec508729326c8e81f1b19d9ab4283ded21e749
-
SHA256
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
SHA512
ce34176e92184a5959ef75acbcfd610e0a0cc5850b573b9dba56583cc70e8db490d3ed3d83d73f4fdcb4ca1bda137a6bfcb3c9c0229abe0e4638d67ac04890fb
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4528-131-0x0000000000400000-0x00000000004D8000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1180 wrote to memory of 4528 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 4528 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 4528 1180 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4e35341633082e70253b945cafb08df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4e35341633082e70253b945cafb08df.dll,#12⤵PID:4528
-