Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 18:37
Behavioral task
behavioral1
Sample
23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe
-
Size
110KB
-
MD5
89e5f0c11f7f0007fa2a09e3cab8dd50
-
SHA1
5885d95969d011e077c1c55d95f5e55a0776f782
-
SHA256
23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290
-
SHA512
6ee3de90823b86fbee7bfda215f0e4c855d1de9e0e1f59b56c688c0a31b305b0264f88442f322ae45e02ef3c2fd0b00d82acfcac10d0b2f73dd99c1843574694
-
SSDEEP
1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:xiyvRmDLs/ZrwWJjAqGcRJ2hg
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\78694EC8 = "C:\\Users\\Admin\\AppData\\Roaming\\78694EC8\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2876-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe 2888 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2888 2876 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe 31 PID 2876 wrote to memory of 2888 2876 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe 31 PID 2876 wrote to memory of 2888 2876 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe 31 PID 2876 wrote to memory of 2888 2876 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe 31 PID 2876 wrote to memory of 2888 2876 23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe 31 PID 2888 wrote to memory of 1100 2888 winver.exe 19 PID 2888 wrote to memory of 1048 2888 winver.exe 17 PID 2888 wrote to memory of 1092 2888 winver.exe 18 PID 2888 wrote to memory of 1100 2888 winver.exe 19 PID 2888 wrote to memory of 1556 2888 winver.exe 25
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1048
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe"C:\Users\Admin\AppData\Local\Temp\23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2888
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1556