Analysis

  • max time kernel
    147s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2024 11:16

General

  • Target

    DBGRID32.dll

  • Size

    507KB

  • MD5

    f3e5afb3436e22ad2ffec89b386532ee

  • SHA1

    ebad400949b524e273435f2717b1aadfe7c9ede7

  • SHA256

    5717b5ff540ab2af539f2bcd2fcfc1b00da8c32ed4f4c290de7467da31a657ce

  • SHA512

    8e009ec7b668aa35986115d770ba6d61879ad235b78b6980cbd9305439a83d2e12f66423633e9caabff535d92ff56c53334726284062bdb939e649525bb41511

  • SSDEEP

    6144:jtBFDh0ce7r4+RATQCBdFWBOsMGHzfuALLcyUdZ5ppz0oqhnLzyvbpcYl3g:j1d0D7r41RDFWBOsMGHzft4yUdMpRY

Score
1/10

Malware Config

Signatures

  • Modifies registry class 60 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DBGRID32.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\DBGRID32.dll
      2⤵
      • Modifies registry class
      PID:4892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads