Resubmissions
31-08-2022 20:26
220831-y73vvsbcfr 1021-07-2022 06:01
220721-gq558adfdn 1020-07-2022 17:02
220720-vj4wgacebl 10Analysis
-
max time kernel
96s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2022 06:01
Static task
static1
Behavioral task
behavioral1
Sample
svc.dll
Resource
win7-20220718-en
windows7-x64
4 signatures
300 seconds
General
-
Target
svc.dll
-
Size
1.2MB
-
MD5
5a800c0c43e7ef2abca922ef59cbdb57
-
SHA1
541127b4c63917a8ad767cc5f9f7cb2f3ba35a4a
-
SHA256
a9f95fd06a5444a4c5d0d4c553a81a4f5f421aea9e07f2bb6b270183f19b7a49
-
SHA512
7d9bd3461fa5182f7b998253972f1916fb0adde7c55ae078b13db7af9ee1ed86881b2ffe9dfd8ed9e163323f38775b5ae0ea7d8d8e2658dba0f5aff161752f5e
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3852-131-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4308 wrote to memory of 3852 4308 regsvr32.exe regsvr32.exe PID 4308 wrote to memory of 3852 4308 regsvr32.exe regsvr32.exe PID 4308 wrote to memory of 3852 4308 regsvr32.exe regsvr32.exe