Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
29-07-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8.dll
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8.dll
-
Size
1.3MB
-
MD5
a484630dcbd57dfd48ab5fa0dc6a5268
-
SHA1
707b2a7abb4572bbbee0d479834bc3e910bba3e2
-
SHA256
f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8
-
SHA512
bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-57-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 912 1408 WerFault.exe regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1408 2040 regsvr32.exe regsvr32.exe PID 1408 wrote to memory of 912 1408 regsvr32.exe WerFault.exe PID 1408 wrote to memory of 912 1408 regsvr32.exe WerFault.exe PID 1408 wrote to memory of 912 1408 regsvr32.exe WerFault.exe PID 1408 wrote to memory of 912 1408 regsvr32.exe WerFault.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 3123⤵
- Program crash
PID:912
-
-