Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 17:10
Behavioral task
behavioral1
Sample
cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe
Resource
win7-20240903-en
General
-
Target
cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe
-
Size
110KB
-
MD5
9553004dea6cc4ca6ec9dc94c85b6200
-
SHA1
62c631c4782863ed0746a72de08db890a9667696
-
SHA256
cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89
-
SHA512
97b368296e4fbe6257e14566389f865938987ab0aa27db1eb1540808e21c5918e8c695acb72387bf8db60b08461bc34a0e2dff00df759521e942b30a72d3f717
-
SSDEEP
1536:ZiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:ZiyvRmDLs/ZrwWJjAqGcRJ2hg
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\713894D0 = "C:\\Users\\Admin\\AppData\\Roaming\\713894D0\\bin.exe" winver.exe -
Processes:
resource yara_rule behavioral1/memory/1968-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exewinver.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
winver.exepid process 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe 2336 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2336 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exewinver.exedescription pid process target process PID 1968 wrote to memory of 2336 1968 cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe winver.exe PID 1968 wrote to memory of 2336 1968 cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe winver.exe PID 1968 wrote to memory of 2336 1968 cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe winver.exe PID 1968 wrote to memory of 2336 1968 cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe winver.exe PID 1968 wrote to memory of 2336 1968 cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe winver.exe PID 2336 wrote to memory of 1140 2336 winver.exe Explorer.EXE PID 2336 wrote to memory of 1060 2336 winver.exe taskhost.exe PID 2336 wrote to memory of 1092 2336 winver.exe Dwm.exe PID 2336 wrote to memory of 1140 2336 winver.exe Explorer.EXE PID 2336 wrote to memory of 760 2336 winver.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe"C:\Users\Admin\AppData\Local\Temp\cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2336
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:760