Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
yA6F7.tmp.dll
Resource
win7-20220715-en
4 signatures
150 seconds
General
-
Target
yA6F7.tmp.dll
-
Size
1.1MB
-
MD5
222ebf178e46a2be70538ad88da0f26b
-
SHA1
d15e1e7eb03f561d7bf237f365dfe9672339439f
-
SHA256
41148bd3c83c0e9334cb8c54aee40a157314fa2f43ff82c780a661fb656675a1
-
SHA512
1c4463044b8e5007612c1c10f8dc9bd3a02b0cd00da4a58394b3c4e83a31335924300807cf8b101c9bc901315bb7e8368435ac8c4f8491ebb1720e5968899c4f
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/1688-131-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1688 3544 regsvr32.exe 82 PID 3544 wrote to memory of 1688 3544 regsvr32.exe 82 PID 3544 wrote to memory of 1688 3544 regsvr32.exe 82