Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll
Resource
win10v2004-20221111-en
General
-
Target
fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll
-
Size
80KB
-
MD5
5bebc0be3e39457e3b978dda270556cb
-
SHA1
282707fb2d2a93859a62d67d86d15b6cf5a99bbf
-
SHA256
fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20
-
SHA512
f2f2a3420d08f0a2d3ff21d0fbf116e27691ae47cbbde20676955ae4e8b99878bcd120b1fd65e7c8e1aca443270f4ad982f92146392e17af51e434ecef482f17
-
SSDEEP
768:JkyMTgHs6AJnf+oZzF7yxPMHjfnC74Ko9A3jC2rkbX9QqLWWt0pXzP2UKv9vb1n0:JkyMTgM1Jnf5FTDKoKCuu9QAdAAl/Du
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 DPGLic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4344 2072 regsvr32.exe 82 PID 2072 wrote to memory of 4344 2072 regsvr32.exe 82 PID 2072 wrote to memory of 4344 2072 regsvr32.exe 82 PID 4344 wrote to memory of 2360 4344 regsvr32.exe 83 PID 4344 wrote to memory of 2360 4344 regsvr32.exe 83 PID 4344 wrote to memory of 2360 4344 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fc07bd0ba38a0ea9b5a692ab615ec4f2ff1d8642b724b793e71211ffba1bdd20.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\DPGLic.exeC:\Users\Admin\AppData\Local\Temp\DPGLic.exe3⤵
- Executes dropped EXE
PID:2360
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5b624242e7d33bf16e07aa3025cf3a526
SHA134e3f465ec4fd14d25bf5416f28f7e7d5952f39a
SHA256b800480175d41b937bdf15bcd8cf7f28f3b8e8e97221c8cfeeb6c1f2c794c2f0
SHA512b02bf6705921abc6b9e75e08a6bd76e0748fa76eba5f4f5bcd281484b924e2a9351f854ac93e6b6a3fc59f29e1c1086cd4b270eff5c962f464f771623c1e2760
-
Filesize
27KB
MD5b624242e7d33bf16e07aa3025cf3a526
SHA134e3f465ec4fd14d25bf5416f28f7e7d5952f39a
SHA256b800480175d41b937bdf15bcd8cf7f28f3b8e8e97221c8cfeeb6c1f2c794c2f0
SHA512b02bf6705921abc6b9e75e08a6bd76e0748fa76eba5f4f5bcd281484b924e2a9351f854ac93e6b6a3fc59f29e1c1086cd4b270eff5c962f464f771623c1e2760