Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 20:02
Static task
static1
Behavioral task
behavioral1
Sample
e44c9e081bb49e9b52f49d621a183eed0b2be02f.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
e44c9e081bb49e9b52f49d621a183eed0b2be02f.dll
-
Size
872KB
-
MD5
a84fc1d210de76f4b5e4434bacfc6d84
-
SHA1
e44c9e081bb49e9b52f49d621a183eed0b2be02f
-
SHA256
64583aa980ff5d3e903c5fc00f835d1043bc5c2d2d41fd098275280fdddc21a1
-
SHA512
c44a9fc2dd1f8d897a71ad4bb4d0801ec328c2ca046de92da3e4b61bf254e8b879925f9b62f963d34578956ef8374ac6f320b51819c23c648c78e920dfbc7a12
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4460-132-0x0000000001EC0000-0x0000000001F9E000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3468 wrote to memory of 4460 3468 rundll32.exe rundll32.exe PID 3468 wrote to memory of 4460 3468 rundll32.exe rundll32.exe PID 3468 wrote to memory of 4460 3468 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e44c9e081bb49e9b52f49d621a183eed0b2be02f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e44c9e081bb49e9b52f49d621a183eed0b2be02f.dll,#12⤵PID:4460
-