Analysis
-
max time kernel
37s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-07-2022 10:28
Static task
static1
Behavioral task
behavioral1
Sample
y78A9.tmp.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
y78A9.tmp.dll
-
Size
872KB
-
MD5
e2b4bed66703ca923c3c1ef8a82a3ff7
-
SHA1
c3da7251c8098c0d94c38bde9409068351686c18
-
SHA256
c642fe65240289bb327a1ac176feba91e851cfb87087bf0275e3381784374912
-
SHA512
063fa9f3d54c2d8dd580fc81aa2aa77199fb0dc9a590b36eaa0ae83b883d2d97e311b04310489f3f4790423bfd24fd905d0f1135334e63d75d11e2bd80e577bd
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-57-0x00000000006C0000-0x000000000079E000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 2024 1972 rundll32.exe rundll32.exe