Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

SVCReady

SVCReady is a loader that has been used since at least April 2022 in malicious spam campaigns. Security researchers have noted overlaps between TA551 activity and SVCReady distribution, including similarities in file names, lure images, and identical grammatical errors.(Citation: HP SVCReady Jun 2022)
ID: S1064
Type: MALWARE
Platforms: Windows
Created: 10 Feb 2023
Last Modified: 18 Apr 2023

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

SVCReady can communicate with its C2 servers via HTTP.(Citation: HP SVCReady Jun 2022)

Enterprise T1059 .005 Command and Scripting Interpreter: Visual Basic

SVCReady has used VBA macros to execute shellcode.(Citation: HP SVCReady Jun 2022)

Enterprise T1546 .015 Event Triggered Execution: Component Object Model Hijacking

SVCReady has created the `HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}` Registry key for persistence.(Citation: HP SVCReady Jun 2022)

Enterprise T1036 .004 Masquerading: Masquerade Task or Service

SVCReady has named a task `RecoveryExTask` as part of its persistence activity.(Citation: HP SVCReady Jun 2022)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

SVCReady has been distributed via spearphishing campaigns containing malicious Mircrosoft Word documents.(Citation: HP SVCReady Jun 2022)

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

SVCReady can create a scheduled task named `RecoveryExTask` to gain persistence.(Citation: HP SVCReady Jun 2022)

Enterprise T1218 .011 System Binary Proxy Execution: Rundll32

SVCReady has used `rundll32.exe` for execution.(Citation: HP SVCReady Jun 2022)

Enterprise T1204 .002 User Execution: Malicious File

SVCReady has relied on users clicking a malicious attachment delivered through spearphishing.(Citation: HP SVCReady Jun 2022)

Enterprise T1497 .001 Virtualization/Sandbox Evasion: System Checks

SVCReady has the ability to determine if its runtime environment is virtualized.(Citation: HP SVCReady Jun 2022)

.003 Virtualization/Sandbox Evasion: Time Based Evasion

SVCReady can enter a sleep stage for 30 minutes to evade detection.(Citation: HP SVCReady Jun 2022)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.