Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 01:04

General

  • Target

    9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe

  • Size

    250KB

  • MD5

    e301b784d1b0de364699ecb9c2c59c1a

  • SHA1

    a343994b3dfd8b1875e8a41660556c69fb3a9f20

  • SHA256

    9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84

  • SHA512

    4d9bc3ede41fe89798558d615bdd06248175f87f387f33385f41d8b1a474cefd712b114928051c4fa178dad8a71111ee7031cbf2df5072773f8901b3489b27b4

  • SSDEEP

    6144:HmkLu0Aqur8q7XMaC4+yPY7HLgZl3MovMfCp5C6:GkLsqur8q7Xp27rk3MoF

Malware Config

Signatures

  • Tinba / TinyBanker

    Banking trojan which uses packet sniffing to steal data.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1260
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1328
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe
          "C:\Users\Admin\AppData\Local\Temp\9a1e94151c9cfbe5ad761a2a666dacfcb2d7c4ab31c9a5ce436376e046499d84.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\SysWOW64\winver.exe
            winver
            3⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2380
      • C:\Windows\system32\DllHost.exe
        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
        1⤵
          PID:1628

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1260-24-0x0000000000190000-0x0000000000197000-memory.dmp

                Filesize

                28KB

              • memory/1260-35-0x0000000077291000-0x0000000077292000-memory.dmp

                Filesize

                4KB

              • memory/1260-34-0x0000000000190000-0x0000000000197000-memory.dmp

                Filesize

                28KB

              • memory/1328-36-0x0000000000130000-0x0000000000137000-memory.dmp

                Filesize

                28KB

              • memory/1328-27-0x0000000000130000-0x0000000000137000-memory.dmp

                Filesize

                28KB

              • memory/1372-7-0x0000000002E60000-0x0000000002E67000-memory.dmp

                Filesize

                28KB

              • memory/1372-11-0x0000000002E60000-0x0000000002E67000-memory.dmp

                Filesize

                28KB

              • memory/1372-30-0x0000000002E70000-0x0000000002E77000-memory.dmp

                Filesize

                28KB

              • memory/1372-12-0x0000000077291000-0x0000000077292000-memory.dmp

                Filesize

                4KB

              • memory/1372-9-0x0000000002E60000-0x0000000002E67000-memory.dmp

                Filesize

                28KB

              • memory/1372-37-0x0000000002E70000-0x0000000002E77000-memory.dmp

                Filesize

                28KB

              • memory/1628-33-0x0000000000200000-0x0000000000207000-memory.dmp

                Filesize

                28KB

              • memory/1628-38-0x0000000000200000-0x0000000000207000-memory.dmp

                Filesize

                28KB

              • memory/1628-39-0x0000000077291000-0x0000000077292000-memory.dmp

                Filesize

                4KB

              • memory/2364-8-0x00000000033D0000-0x0000000003DD0000-memory.dmp

                Filesize

                10.0MB

              • memory/2364-0-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/2364-1-0x0000000002180000-0x0000000002300000-memory.dmp

                Filesize

                1.5MB

              • memory/2364-2-0x00000000004F0000-0x00000000004F1000-memory.dmp

                Filesize

                4KB

              • memory/2364-3-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/2364-22-0x0000000000400000-0x0000000000442000-memory.dmp

                Filesize

                264KB

              • memory/2364-5-0x00000000004F0000-0x00000000004F1000-memory.dmp

                Filesize

                4KB

              • memory/2364-4-0x0000000002180000-0x0000000002300000-memory.dmp

                Filesize

                1.5MB

              • memory/2380-10-0x00000000000B0000-0x00000000000B7000-memory.dmp

                Filesize

                28KB

              • memory/2380-20-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/2380-19-0x0000000000130000-0x0000000000131000-memory.dmp

                Filesize

                4KB

              • memory/2380-18-0x00000000007A0000-0x00000000007B6000-memory.dmp

                Filesize

                88KB

              • memory/2380-17-0x000000007743F000-0x0000000077440000-memory.dmp

                Filesize

                4KB

              • memory/2380-16-0x0000000077440000-0x0000000077441000-memory.dmp

                Filesize

                4KB

              • memory/2380-14-0x000000007743F000-0x0000000077441000-memory.dmp

                Filesize

                8KB

              • memory/2380-13-0x00000000000B0000-0x00000000000B7000-memory.dmp

                Filesize

                28KB

              • memory/2380-45-0x00000000000B0000-0x00000000000B7000-memory.dmp

                Filesize

                28KB