Analysis
-
max time kernel
54s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
27-07-2022 08:51
Static task
static1
General
-
Target
y414E.tmp.dll
-
Size
1.2MB
-
MD5
924fa82e5eb7ef7e2c1374cebde74ca4
-
SHA1
0d4a96d452ab6a3f2cb751a75e710defa5f829a1
-
SHA256
b597e5634394ef9ac271af839753cc4cae07343193d01997d1e7d6cdc33956ff
-
SHA512
f836569444e50adf45fe631ed5c59c79d69c7c0f35c497a3f4d8ecc18c91a08a8094815f064e0307b44554047806991d7ca0968e830b9fed12e65420a0a6f131
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-160-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3920 wrote to memory of 1588 3920 regsvr32.exe regsvr32.exe PID 3920 wrote to memory of 1588 3920 regsvr32.exe regsvr32.exe PID 3920 wrote to memory of 1588 3920 regsvr32.exe regsvr32.exe