Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:30
Static task
static1
Behavioral task
behavioral1
Sample
27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe
Resource
win10v2004-20241007-en
General
-
Target
27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe
-
Size
225KB
-
MD5
93e77c0f34c6379bf129119aa2907cb0
-
SHA1
bb0bf5ed226dc2f9b41b516a5e6ad36813d15c07
-
SHA256
27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041d
-
SHA512
5ea311fdc734be7de89ac5b70621e5195b99c89deb7a56aaaa3fcf1c86beed4c172df74b1bb4c148a5dc1a2525886f62b43962db7b3162a86b721293bac280aa
-
SSDEEP
6144:vA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:vATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\19934551 = "C:\\Users\\Admin\\AppData\\Roaming\\19934551\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe 2692 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2692 1800 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe 31 PID 1800 wrote to memory of 2692 1800 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe 31 PID 1800 wrote to memory of 2692 1800 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe 31 PID 1800 wrote to memory of 2692 1800 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe 31 PID 1800 wrote to memory of 2692 1800 27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe 31 PID 2692 wrote to memory of 1216 2692 winver.exe 21 PID 2692 wrote to memory of 1116 2692 winver.exe 19 PID 2692 wrote to memory of 1172 2692 winver.exe 20 PID 2692 wrote to memory of 1216 2692 winver.exe 21 PID 2692 wrote to memory of 1284 2692 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe"C:\Users\Admin\AppData\Local\Temp\27e5f0cc8d9acac5b0e98dd56b67ded58957a60167a0ef47a879cfb446f0041dN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1284