Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-07-2022 21:27
Static task
static1
Behavioral task
behavioral1
Sample
SOGR6zUe.dll
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
SOGR6zUe.dll
-
Size
825KB
-
MD5
bc728989674865a198aa7ec34a4eac10
-
SHA1
227ac19bdf420f3a419d0b9a35f02c02b685324f
-
SHA256
f690071e5394aa76f14e2b5cb5cfb15de51d689ed5213e9cf8b931a6721a11c6
-
SHA512
757e532fa959262c0aaf803a2ec5f269a6a92938a6a52aceca698873f300ee5d941e1e041a5cde63c6f83053a4d511fb274409d739e27da04d979e2643d30555
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/2356-131-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2356 2148 regsvr32.exe 79 PID 2148 wrote to memory of 2356 2148 regsvr32.exe 79 PID 2148 wrote to memory of 2356 2148 regsvr32.exe 79