Analysis
-
max time kernel
470s -
max time network
420s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
26-07-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
payload.dll
Resource
win7-20220715-en
windows7-x64
4 signatures
600 seconds
General
-
Target
payload.dll
-
Size
1.3MB
-
MD5
f2b499f84ad9ebf8a399a44e28238523
-
SHA1
17ac7422766b613a649aecfe3c9da7cdbb941df9
-
SHA256
615519a5865324398662b7a1d9cab1ac5ffbca4de78713d9a8813135d5c117f1
-
SHA512
8bf2eee21938bebcd858a3b2a9f28e073b8a340426dc6bff4fd3fd2ef19a27a96d3918baa198d340ad516e5e56133c817dc93baab9aa2d543c628048dffc18bc
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-57-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1800 1992 WerFault.exe regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 2008 wrote to memory of 1992 2008 regsvr32.exe regsvr32.exe PID 1992 wrote to memory of 1800 1992 regsvr32.exe WerFault.exe PID 1992 wrote to memory of 1800 1992 regsvr32.exe WerFault.exe PID 1992 wrote to memory of 1800 1992 regsvr32.exe WerFault.exe PID 1992 wrote to memory of 1800 1992 regsvr32.exe WerFault.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\payload.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\payload.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 3123⤵
- Program crash
PID:1800
-
-