Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20220718-it
  • resource tags

    arch:x64arch:x86image:win10-20220718-itlocale:it-itos:windows10-1703-x64systemwindows
  • submitted
    22-07-2022 14:49

General

  • Target

    y2FD1.tmp.dll

  • Size

    1.1MB

  • MD5

    7e4722c69a08c97e5f2cdd2e78c091f3

  • SHA1

    831ae50906861832a64e61bf006d943e7fb3fac9

  • SHA256

    f90159634dfa11715de1d813ba5747e3e795017f75926b49d4365acc4a4ca807

  • SHA512

    07be715ee6c245c40b618509340f90a8a6677b0525047d6808d8a4b75831e4f22f7348f31efec5deba87e7ec7042e139cefcb9fdfd7231f6518b4f14d8d7b0fc

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 1 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\y2FD1.tmp.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\y2FD1.tmp.dll
      2⤵
        PID:2348
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4640
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4792
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
          PID:4416

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2348-118-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-119-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-120-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-121-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-122-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-123-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-124-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-125-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-126-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-127-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-128-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-129-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-130-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-131-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-132-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-133-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-134-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-135-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-136-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-137-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-138-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-139-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-140-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-141-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-142-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-143-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-144-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-145-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-146-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-147-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-148-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-149-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-150-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-151-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-152-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-153-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-154-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-155-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-156-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-157-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-158-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-159-0x0000000010000000-0x0000000010091000-memory.dmp

          Filesize

          580KB

        • memory/2348-164-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB

        • memory/2348-165-0x00000000771A0000-0x000000007732E000-memory.dmp

          Filesize

          1.6MB