Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
-
Size
848KB
-
MD5
b4e35341633082e70253b945cafb08df
-
SHA1
e7ec508729326c8e81f1b19d9ab4283ded21e749
-
SHA256
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
SHA512
ce34176e92184a5959ef75acbcfd610e0a0cc5850b573b9dba56583cc70e8db490d3ed3d83d73f4fdcb4ca1bda137a6bfcb3c9c0229abe0e4638d67ac04890fb
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-57-0x0000000000760000-0x0000000000838000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1612 748 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#12⤵PID:1612
-