Analysis
-
max time kernel
52s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 10:24
Static task
static1
Behavioral task
behavioral1
Sample
581ea1427755f8bba03dfed0050f4fd7.dll
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
581ea1427755f8bba03dfed0050f4fd7.dll
-
Size
1.1MB
-
MD5
581ea1427755f8bba03dfed0050f4fd7
-
SHA1
469d28114e05e37665b75a8eccb27f6542c02569
-
SHA256
fba8055b07c69a4107fd4c51330f732a0f60fef66c9324b92a16d80734a522c2
-
SHA512
a5f675692d5708a076f2e0cd6a2250efcd567150f243bfd13d1d38b6d2eb3104ff5ef4832473f60937e0ed989cee694131c6c49daf8ee08b51bc69d79df16b71
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4424-131-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3624 wrote to memory of 4424 3624 regsvr32.exe regsvr32.exe PID 3624 wrote to memory of 4424 3624 regsvr32.exe regsvr32.exe PID 3624 wrote to memory of 4424 3624 regsvr32.exe regsvr32.exe