Resubmissions
05-07-2022 14:19
220705-rmtywsbhg7 1009-06-2022 16:14
220609-tpy2qsebe7 107-06-2022 11:35
220607-np1mnsead7 1Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
y3036.tmp.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
y3036.tmp.dll
-
Size
557KB
-
MD5
d19c5e1fb2d895ff61c0ff89cd0fc1a0
-
SHA1
89900c9532f88bd58382ced3ee0bc86413e0fce0
-
SHA256
08e427c92010a8a282c894cf5a77a874e09c08e283a66f1905c131871cc4d273
-
SHA512
e3dfb8c680b9575a2ffdbedfc988392bb67833c5c3c1ca23fbbf4c1a086bcacbc287c1fa3f648f60238e8e292b521f864312f5c8bba8c93057b8fe4982d14ba7
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-56-0x0000000074AB0000-0x0000000074B41000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 1524 1984 rundll32.exe rundll32.exe