Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 08:57
Behavioral task
behavioral1
Sample
a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe
Resource
win7-20240903-en
General
-
Target
a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe
-
Size
160KB
-
MD5
8f4fb0827a88cb504206e5e531bb9e43
-
SHA1
0c1c55c624d970fab4cb57acb4ccd04c5cf0b7be
-
SHA256
a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654
-
SHA512
306403a13d55dfe69299b2fb4e08087b66a5eaaace2afcb272665c47c70b01fdf94f5262cc15ad23766c80621bb2aa455322912354f1c0251bba4e691ba54f7b
-
SSDEEP
1536:SEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:ZY+4MiIkLZJNAQ9J6ve
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\DD37A6E5 = "C:\\Users\\Admin\\AppData\\Roaming\\DD37A6E5\\bin.exe" winver.exe -
Processes:
resource yara_rule behavioral1/memory/1292-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exewinver.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
winver.exepid process 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe 2712 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2712 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exewinver.exedescription pid process target process PID 1292 wrote to memory of 2712 1292 a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe winver.exe PID 1292 wrote to memory of 2712 1292 a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe winver.exe PID 1292 wrote to memory of 2712 1292 a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe winver.exe PID 1292 wrote to memory of 2712 1292 a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe winver.exe PID 1292 wrote to memory of 2712 1292 a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe winver.exe PID 2712 wrote to memory of 1208 2712 winver.exe Explorer.EXE PID 2712 wrote to memory of 1120 2712 winver.exe taskhost.exe PID 2712 wrote to memory of 1176 2712 winver.exe Dwm.exe PID 2712 wrote to memory of 1208 2712 winver.exe Explorer.EXE PID 2712 wrote to memory of 1288 2712 winver.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe"C:\Users\Admin\AppData\Local\Temp\a937fa77d341969272de40c1c9162d68138a18bd1336f2f23ba49f3d99c34654.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288