Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2022 13:35
Static task
static1
General
-
Target
foo.dll
-
Size
1.2MB
-
MD5
1ec34620ca121e2838bce8ab932f4ebf
-
SHA1
8711b4251eaa9bfee1f805f60ee50f7cf19934f1
-
SHA256
9602ee146782c2c95fa1aa31f574424e0f408b39315fb940979eb2793a994bea
-
SHA512
1d12b3026dc390689bd4e9fd003eddc05c1beafba8be065188ad94e7feac0e3aced699dbf7107c6255c621b1323fd19d160d1e05916a42d2b5517961b3cd4f66
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2624-131-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1552 wrote to memory of 2624 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 2624 1552 regsvr32.exe regsvr32.exe PID 1552 wrote to memory of 2624 1552 regsvr32.exe regsvr32.exe