Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
26-07-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
yA6F7.tmp.dll
Resource
win7-20220715-en
4 signatures
150 seconds
General
-
Target
yA6F7.tmp.dll
-
Size
1.1MB
-
MD5
222ebf178e46a2be70538ad88da0f26b
-
SHA1
d15e1e7eb03f561d7bf237f365dfe9672339439f
-
SHA256
41148bd3c83c0e9334cb8c54aee40a157314fa2f43ff82c780a661fb656675a1
-
SHA512
1c4463044b8e5007612c1c10f8dc9bd3a02b0cd00da4a58394b3c4e83a31335924300807cf8b101c9bc901315bb7e8368435ac8c4f8491ebb1720e5968899c4f
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral1/memory/1984-57-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Program crash 1 IoCs
pid pid_target Process procid_target 988 1984 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 904 wrote to memory of 1984 904 regsvr32.exe 27 PID 1984 wrote to memory of 988 1984 regsvr32.exe 28 PID 1984 wrote to memory of 988 1984 regsvr32.exe 28 PID 1984 wrote to memory of 988 1984 regsvr32.exe 28 PID 1984 wrote to memory of 988 1984 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\yA6F7.tmp.dll1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\yA6F7.tmp.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 3003⤵
- Program crash
PID:988
-
-