Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 03:19
Static task
static1
Behavioral task
behavioral1
Sample
7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe
Resource
win10v2004-20241007-en
General
-
Target
7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe
-
Size
89KB
-
MD5
6a38a84265978ca9de6c79dd58efd4a0
-
SHA1
9d13459d6467135b386ade5982bf282c2e6bf170
-
SHA256
7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8c
-
SHA512
bc6f583bb2c8ed9be4f1c4065a063e86ee872f3b9c14489d62422d904a16261fce070fe843c343b1d7e95d162f5d09bcab4c7118d9990054a010378e5a419e1f
-
SSDEEP
1536:o9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA:o9o6fK2XqXQwhnHlqQo8Lvy
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ECEB7B9A = "C:\\Users\\Admin\\AppData\\Roaming\\ECEB7B9A\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe 2500 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2500 2084 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe 30 PID 2084 wrote to memory of 2500 2084 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe 30 PID 2084 wrote to memory of 2500 2084 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe 30 PID 2084 wrote to memory of 2500 2084 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe 30 PID 2084 wrote to memory of 2500 2084 7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe 30 PID 2500 wrote to memory of 1208 2500 winver.exe 21 PID 2500 wrote to memory of 1108 2500 winver.exe 19 PID 2500 wrote to memory of 1152 2500 winver.exe 20 PID 2500 wrote to memory of 1208 2500 winver.exe 21 PID 2500 wrote to memory of 1648 2500 winver.exe 25 PID 2500 wrote to memory of 2084 2500 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe"C:\Users\Admin\AppData\Local\Temp\7383d630d34ec3fec8f84e7bfa64361e6a28f1450928111a0d9d46192efd1e8cN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2500
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1648