Analysis
-
max time kernel
126s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2022 06:09
Static task
static1
Behavioral task
behavioral1
Sample
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
Resource
win7-20220715-en
windows7-x64
3 signatures
150 seconds
General
-
Target
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
-
Size
848KB
-
MD5
b4e35341633082e70253b945cafb08df
-
SHA1
e7ec508729326c8e81f1b19d9ab4283ded21e749
-
SHA256
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91
-
SHA512
ce34176e92184a5959ef75acbcfd610e0a0cc5850b573b9dba56583cc70e8db490d3ed3d83d73f4fdcb4ca1bda137a6bfcb3c9c0229abe0e4638d67ac04890fb
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/4716-132-0x0000000000AB0000-0x0000000000B88000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4716 1408 rundll32.exe 82 PID 1408 wrote to memory of 4716 1408 rundll32.exe 82 PID 1408 wrote to memory of 4716 1408 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll,#12⤵PID:4716
-