Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-11-2020 12:14

General

  • Target

    4b1cc55485401ff64c0b4fd074f941eb.exe

  • Size

    152KB

  • MD5

    0c006c2d559220f0f18cbd99f6924674

  • SHA1

    91fac222a17f3fff564f2c89aac41dd74793eb54

  • SHA256

    47ea2f6c893753b726f6192d5a14c681fe0c2da7c741341965cf449be81c18ab

  • SHA512

    f925f7189f70fc73736d7b5fa65ae5f86aa93dfb74f240d79ecb6b144f053a75932c071b3b9c7d2053c516d0f873875ee9c55c3473e6c092fb3e6b44f0592951

Malware Config

Signatures

  • Tinba / TinyBanker

    Banking trojan which uses packet sniffing to steal data.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1128
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1228
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1268
        • C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe
          "C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe"
          2⤵
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\SysWOW64\winver.exe
            winver
            3⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1868

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1128-3-0x0000000000210000-0x0000000000217000-memory.dmp

        Filesize

        28KB

      • memory/1228-4-0x0000000001AD0000-0x0000000001AD7000-memory.dmp

        Filesize

        28KB

      • memory/1268-2-0x0000000002590000-0x0000000002597000-memory.dmp

        Filesize

        28KB

      • memory/1268-5-0x00000000025A0000-0x00000000025A7000-memory.dmp

        Filesize

        28KB

      • memory/1744-0-0x0000000000220000-0x0000000000225000-memory.dmp

        Filesize

        20KB