Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 12:07
Static task
static1
Behavioral task
behavioral1
Sample
d61245a683ce14ec872dc9b765f87016.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d61245a683ce14ec872dc9b765f87016.exe
Resource
win10v2004-20240226-en
General
-
Target
d61245a683ce14ec872dc9b765f87016.exe
-
Size
72KB
-
MD5
d61245a683ce14ec872dc9b765f87016
-
SHA1
392502a17d9496b0f1314f79ba832a25262b100b
-
SHA256
f01fa68820687836026b7c4f42834b6d8e2b2965afedd72e47fc2faf35d75e8d
-
SHA512
8b7e5c78c79b0b287dbc37de85b9fdc79819a8de31c4dacd318831082060d955c0d503f42a94e540cbd809736fe99c0e9b597c1f8664c91e2ca48fbc102affa7
-
SSDEEP
768:wY52Aof25yvI7kOyEL6WYDNoxTSc2OYQOByzN6BED72:d0AoO5yvI4OyEL695fj3ByzgBEDq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DanBtR270414 = "C:\\WINDOWS\\system32\\DanBtR270414.exe" d61245a683ce14ec872dc9b765f87016.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\DanBtR270414.exe d61245a683ce14ec872dc9b765f87016.exe File opened for modification C:\WINDOWS\SysWOW64\DanBtR270414.exe d61245a683ce14ec872dc9b765f87016.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2908 d61245a683ce14ec872dc9b765f87016.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d61245a683ce14ec872dc9b765f87016
SHA1392502a17d9496b0f1314f79ba832a25262b100b
SHA256f01fa68820687836026b7c4f42834b6d8e2b2965afedd72e47fc2faf35d75e8d
SHA5128b7e5c78c79b0b287dbc37de85b9fdc79819a8de31c4dacd318831082060d955c0d503f42a94e540cbd809736fe99c0e9b597c1f8664c91e2ca48fbc102affa7