Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
08-08-2022 06:09
Static task
static1
Behavioral task
behavioral1
Sample
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
Resource
win7-20220715-en
windows7-x64
3 signatures
150 seconds
General
-
Target
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
-
Size
848KB
-
MD5
b4e35341633082e70253b945cafb08df
-
SHA1
e7ec508729326c8e81f1b19d9ab4283ded21e749
-
SHA256
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
SHA512
ce34176e92184a5959ef75acbcfd610e0a0cc5850b573b9dba56583cc70e8db490d3ed3d83d73f4fdcb4ca1bda137a6bfcb3c9c0229abe0e4638d67ac04890fb
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral1/memory/2016-57-0x00000000006A0000-0x0000000000778000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27 PID 1968 wrote to memory of 2016 1968 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#12⤵PID:2016
-