CallFunction
Static task
static1
Behavioral task
behavioral1
Sample
y3036.tmp.dll
Resource
win7-20220414-en
General
-
Target
y3036.tmp.dll
-
Size
557KB
-
MD5
d19c5e1fb2d895ff61c0ff89cd0fc1a0
-
SHA1
89900c9532f88bd58382ced3ee0bc86413e0fce0
-
SHA256
08e427c92010a8a282c894cf5a77a874e09c08e283a66f1905c131871cc4d273
-
SHA512
e3dfb8c680b9575a2ffdbedfc988392bb67833c5c3c1ca23fbbf4c1a086bcacbc287c1fa3f648f60238e8e292b521f864312f5c8bba8c93057b8fe4982d14ba7
-
SSDEEP
12288:YQ+XhbSGBTGGTYu7Ck92hluZpndpnoIYyYUWgcB/7DbEP:YQ+XESyW1/EfuvdX9MB/bE
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule sample family_svcready -
Svcready family
Files
-
y3036.tmp.dll.dll windows x86
dfd8d552723e495f48ae2a7b0a8a637b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
VirtualProtectEx
LocalFree
GetFileSize
WriteFile
MultiByteToWideChar
GetModuleHandleExA
GetModuleHandleW
WideCharToMultiByte
FormatMessageA
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
VirtualFree
VirtualAlloc
FreeLibrary
GetProcAddress
IsBadReadPtr
CreateThread
HeapSize
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CloseHandle
CreateFileA
GetLastError
GetCommandLineA
GetModuleHandleA
LocalAlloc
WaitForSingleObject
SetFilePointer
OutputDebugStringA
GetCurrentProcess
SetLastError
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
ReadFile
CreateFileW
LoadLibraryExW
RaiseException
InterlockedFlushSList
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
user32
GetCursorPos
BeginPaint
UpdateWindow
EndPaint
KillTimer
GetMessageA
DispatchMessageA
LoadCursorA
FillRect
CreateWindowExW
RegisterClassExW
LoadStringW
wsprintfA
ShowWindow
GetAsyncKeyState
TranslateAcceleratorA
SetTimer
LoadAcceleratorsA
DefWindowProcA
SetLayeredWindowAttributes
TranslateMessage
SendMessageA
LoadIconA
GetClientRect
gdi32
Ellipse
GetStockObject
SelectObject
Exports
Exports
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 292KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx1 Size: 512B - Virtual size: 429B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ