Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    09-05-2021 01:12

General

  • Target

    3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a.exe

  • Size

    98KB

  • MD5

    ceabbec628e38d10806bbaa24ac4db69

  • SHA1

    fddd22b3aee1cfa4ed60d58da6f15a551a06d8f0

  • SHA256

    3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a

  • SHA512

    c53dc11f527abfa37fc160fa3be74e3b03859407ff1cfd290adc99096672942fd3cac1dbcec2b5dd83e3e60c1eea71dda2754312f78d970270e293caaa725667

Malware Config

Signatures

  • Tinba / TinyBanker

    Banking trojan which uses packet sniffing to steal data.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a.exe
      "C:\Users\Admin\AppData\Local\Temp\3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Users\Admin\AppData\Local\Temp\3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a.exe
        C:\Users\Admin\AppData\Local\Temp\3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\winver.exe
          winver
          4⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2428
  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2724
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
      1⤵
        PID:2356
      • c:\windows\system32\sihost.exe
        sihost.exe
        1⤵
          PID:2332
        • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
          "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
          1⤵
            PID:3220
          • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
            1⤵
              PID:3240
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3740
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 3740 -s 848
                  2⤵
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2564
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:3444
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                  1⤵
                    PID:1840

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/1840-129-0x00000000002D0000-0x00000000002D6000-memory.dmp
                    Filesize

                    24KB

                  • memory/2156-115-0x0000000000400000-0x000000000149A000-memory.dmp
                    Filesize

                    16.6MB

                  • memory/2156-116-0x0000000000401000-mapping.dmp
                  • memory/2156-118-0x0000000000400000-0x0000000000404400-memory.dmp
                    Filesize

                    17KB

                  • memory/2156-119-0x00000000018E0000-0x00000000022E0000-memory.dmp
                    Filesize

                    10.0MB

                  • memory/2332-125-0x00000000007A0000-0x00000000007A6000-memory.dmp
                    Filesize

                    24KB

                  • memory/2356-126-0x0000000000EA0000-0x0000000000EA6000-memory.dmp
                    Filesize

                    24KB

                  • memory/2428-120-0x00000000006D0000-0x000000000077E000-memory.dmp
                    Filesize

                    696KB

                  • memory/2428-117-0x0000000000000000-mapping.dmp
                  • memory/2564-130-0x0000000000520000-0x0000000000526000-memory.dmp
                    Filesize

                    24KB

                  • memory/2564-131-0x00007FFE1C2D0000-0x00007FFE1C2D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2724-127-0x0000000000900000-0x0000000000906000-memory.dmp
                    Filesize

                    24KB

                  • memory/3016-122-0x00007FFE1C2D0000-0x00007FFE1C2D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3016-121-0x0000000000C00000-0x0000000000C06000-memory.dmp
                    Filesize

                    24KB

                  • memory/3016-123-0x00007FFE1C2E0000-0x00007FFE1C2E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3016-124-0x0000000000890000-0x0000000000896000-memory.dmp
                    Filesize

                    24KB

                  • memory/3444-128-0x0000000000A20000-0x0000000000A26000-memory.dmp
                    Filesize

                    24KB

                  • memory/3876-114-0x0000000000610000-0x0000000000614000-memory.dmp
                    Filesize

                    16KB