Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 06:57
Behavioral task
behavioral1
Sample
dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
120 seconds
General
-
Target
dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe
-
Size
160KB
-
MD5
ac6a264b7cc7cedabbc39db4400d9868
-
SHA1
f053c89d60c498c0302e63d1c516bd7e77896276
-
SHA256
dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383
-
SHA512
3e10f4d851e338dc37114ad7f5e4d79de58dd3ba4fed1f7b8fea36e5fb64e5226b8e0988a9e20b8d900745d6acf486a983a7c3d8b966d46a6c24db29b86a0092
-
SSDEEP
1536:DEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:AY+4MiIkLZJNAQ9J6v6
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\95253BA0 = "C:\\Users\\Admin\\AppData\\Roaming\\95253BA0\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2512-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe 2300 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2300 2512 dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe 31 PID 2512 wrote to memory of 2300 2512 dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe 31 PID 2512 wrote to memory of 2300 2512 dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe 31 PID 2512 wrote to memory of 2300 2512 dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe 31 PID 2512 wrote to memory of 2300 2512 dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe 31 PID 2300 wrote to memory of 1232 2300 winver.exe 21 PID 2300 wrote to memory of 1112 2300 winver.exe 19 PID 2300 wrote to memory of 1164 2300 winver.exe 20 PID 2300 wrote to memory of 1232 2300 winver.exe 21 PID 2300 wrote to memory of 632 2300 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe"C:\Users\Admin\AppData\Local\Temp\dda9492c7453b40215990fc36578bce90a68c1f302a5001d471ff0d84b4b9383.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2300
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:632