Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:34
Static task
static1
Behavioral task
behavioral1
Sample
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe
Resource
win10v2004-20241007-en
General
-
Target
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe
-
Size
88KB
-
MD5
63d3e052c956f5635c0b16b942ad7817
-
SHA1
e932ce4b2681f1b48f96778ef0ebad5ac1676dd2
-
SHA256
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b
-
SHA512
7a9010045601e82da9f87dc93bbecfc1dbfacbfb6528ae080e133b0b87d30f859ab0049b0bae36b3eaa20dcc172d7d08ac581b34246472028c6c868105dc4b58
-
SSDEEP
1536:25nfmIpxDWbUfd3aOPmxxEhvgCooXqRQqjh+rmKVsNI:25fvp12UFKcD/6jwqWsNI
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\B06F2A3D = "C:\\Users\\Admin\\AppData\\Roaming\\B06F2A3D\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exewinver.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2836 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exewinver.exedescription pid process target process PID 2728 wrote to memory of 2836 2728 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe winver.exe PID 2728 wrote to memory of 2836 2728 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe winver.exe PID 2728 wrote to memory of 2836 2728 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe winver.exe PID 2728 wrote to memory of 2836 2728 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe winver.exe PID 2728 wrote to memory of 2836 2728 42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe winver.exe PID 2836 wrote to memory of 1204 2836 winver.exe Explorer.EXE PID 2836 wrote to memory of 1096 2836 winver.exe taskhost.exe PID 2836 wrote to memory of 1164 2836 winver.exe Dwm.exe PID 2836 wrote to memory of 1204 2836 winver.exe Explorer.EXE PID 2836 wrote to memory of 1508 2836 winver.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe"C:\Users\Admin\AppData\Local\Temp\42543599c5ee82c4cf3b27a1f068f351b921e5ad69105f3cd095500940d1331b.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2836
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1508