Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-11-2020 12:14

General

  • Target

    4b1cc55485401ff64c0b4fd074f941eb.exe

  • Size

    152KB

  • MD5

    0c006c2d559220f0f18cbd99f6924674

  • SHA1

    91fac222a17f3fff564f2c89aac41dd74793eb54

  • SHA256

    47ea2f6c893753b726f6192d5a14c681fe0c2da7c741341965cf449be81c18ab

  • SHA512

    f925f7189f70fc73736d7b5fa65ae5f86aa93dfb74f240d79ecb6b144f053a75932c071b3b9c7d2053c516d0f873875ee9c55c3473e6c092fb3e6b44f0592951

Malware Config

Signatures

  • Tinba / TinyBanker

    Banking trojan which uses packet sniffing to steal data.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • c:\windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2348
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
      1⤵
        PID:2368
      • c:\windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2500
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
          • Suspicious use of UnmapMainImage
          PID:3048
          • C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe
            "C:\Users\Admin\AppData\Local\Temp\4b1cc55485401ff64c0b4fd074f941eb.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:656
            • C:\Windows\SysWOW64\winver.exe
              winver
              3⤵
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:3196
        • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
          "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
          1⤵
            PID:3272
          • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
            1⤵
              PID:3288
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3500
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:3788
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                  1⤵
                    PID:4064

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/656-10-0x0000000000410000-0x0000000000417000-memory.dmp
                    Filesize

                    28KB

                  • memory/2348-2-0x0000000000750000-0x0000000000757000-memory.dmp
                    Filesize

                    28KB

                  • memory/2368-3-0x0000000000860000-0x0000000000867000-memory.dmp
                    Filesize

                    28KB

                  • memory/2500-4-0x00000000000B0000-0x00000000000B7000-memory.dmp
                    Filesize

                    28KB

                  • memory/3048-1-0x0000000002570000-0x0000000002577000-memory.dmp
                    Filesize

                    28KB

                  • memory/3048-5-0x00000000005B0000-0x00000000005B7000-memory.dmp
                    Filesize

                    28KB

                  • memory/3196-0-0x0000000000000000-mapping.dmp
                  • memory/3272-6-0x0000000000170000-0x0000000000177000-memory.dmp
                    Filesize

                    28KB

                  • memory/3288-7-0x0000000000A10000-0x0000000000A17000-memory.dmp
                    Filesize

                    28KB

                  • memory/3500-8-0x0000000000600000-0x0000000000607000-memory.dmp
                    Filesize

                    28KB

                  • memory/3788-9-0x0000000000D50000-0x0000000000D57000-memory.dmp
                    Filesize

                    28KB