Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 19:07

General

  • Target

    fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll

  • Size

    80KB

  • MD5

    5bebc0be3e39457e3b978dda270556cb

  • SHA1

    282707fb2d2a93859a62d67d86d15b6cf5a99bbf

  • SHA256

    fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20

  • SHA512

    f2f2a3420d08f0a2d3ff21d0fbf116e27691ae47cbbde20676955ae4e8b99878bcd120b1fd65e7c8e1aca443270f4ad982f92146392e17af51e434ecef482f17

  • SSDEEP

    768:JkyMTgHs6AJnf+oZzF7yxPMHjfnC74Ko9A3jC2rkbX9QqLWWt0pXzP2UKv9vb1n0:JkyMTgM1Jnf5FTDKoKCuu9QAdAAl/Du

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\DPGLic.exe
        C:\Users\Admin\AppData\Local\Temp\DPGLic.exe
        3⤵
        • Executes dropped EXE
        PID:2360

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DPGLic.exe

          Filesize

          27KB

          MD5

          b624242e7d33bf16e07aa3025cf3a526

          SHA1

          34e3f465ec4fd14d25bf5416f28f7e7d5952f39a

          SHA256

          b800480175d41b937bdf15bcd8cf7f28f3b8e8e97221c8cfeeb6c1f2c794c2f0

          SHA512

          b02bf6705921abc6b9e75e08a6bd76e0748fa76eba5f4f5bcd281484b924e2a9351f854ac93e6b6a3fc59f29e1c1086cd4b270eff5c962f464f771623c1e2760

        • C:\Users\Admin\AppData\Local\Temp\DPGLic.exe

          Filesize

          27KB

          MD5

          b624242e7d33bf16e07aa3025cf3a526

          SHA1

          34e3f465ec4fd14d25bf5416f28f7e7d5952f39a

          SHA256

          b800480175d41b937bdf15bcd8cf7f28f3b8e8e97221c8cfeeb6c1f2c794c2f0

          SHA512

          b02bf6705921abc6b9e75e08a6bd76e0748fa76eba5f4f5bcd281484b924e2a9351f854ac93e6b6a3fc59f29e1c1086cd4b270eff5c962f464f771623c1e2760

        • memory/2360-135-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2360-137-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB