Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.Tinba.GZN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Tinba.GZN.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Tinba.GZN.exe
-
Size
225KB
-
MD5
3bdce816476bf92af5287f3fcb398870
-
SHA1
a673b5dd870702432f7661b051427d0386bddaa7
-
SHA256
5a108f9a23f98075b5abcb0a378d83e4cabc4c191eb334c8dfbca34e7abc54ce
-
SHA512
c546431337249bebc279b588d37cb97ffee0b187164fa31a7b40545fc456a0c6a6c05555b7dc175213da3fb8207b6b4b4881608771a415feee1c5eb18e30a261
-
SSDEEP
6144:zA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:zATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\E87142C1 = "C:\\Users\\Admin\\AppData\\Roaming\\E87142C1\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Tinba.GZN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe 2876 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2876 2516 Trojan.Win32.Tinba.GZN.exe 31 PID 2516 wrote to memory of 2876 2516 Trojan.Win32.Tinba.GZN.exe 31 PID 2516 wrote to memory of 2876 2516 Trojan.Win32.Tinba.GZN.exe 31 PID 2516 wrote to memory of 2876 2516 Trojan.Win32.Tinba.GZN.exe 31 PID 2516 wrote to memory of 2876 2516 Trojan.Win32.Tinba.GZN.exe 31 PID 2876 wrote to memory of 1216 2876 winver.exe 21 PID 2876 wrote to memory of 1112 2876 winver.exe 19 PID 2876 wrote to memory of 1168 2876 winver.exe 20 PID 2876 wrote to memory of 1216 2876 winver.exe 21 PID 2876 wrote to memory of 1068 2876 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Tinba.GZN.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Tinba.GZN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2876
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1068