Analysis
-
max time kernel
103s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2022 15:35
Static task
static1
Behavioral task
behavioral1
Sample
b14416e5dc3d8268b6817297f442465f.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b14416e5dc3d8268b6817297f442465f.dll
-
Size
1.3MB
-
MD5
b14416e5dc3d8268b6817297f442465f
-
SHA1
d763781121359fb614804f874c373d6fa12b4a27
-
SHA256
826103395ef4d9e9a5c3fd9d4acf0e92fc7b334b3529d227570909ca8ce2c150
-
SHA512
fcea7c2bdaebca25dfcb8aa67d8ed35259d309a97e6f625278dd8bdb23a069b3d0c817da5ddff7d2a038d79dc98c50dfaf51719a138aafb61665f2e70d3aacf8
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/4740-133-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 4740 456 regsvr32.exe 80 PID 456 wrote to memory of 4740 456 regsvr32.exe 80 PID 456 wrote to memory of 4740 456 regsvr32.exe 80