Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe
Resource
win10v2004-20241007-en
General
-
Target
af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe
-
Size
62KB
-
MD5
7bc905e9818fdc4db4aaf1f672d4ac6c
-
SHA1
efa7e31c68031bb6d9f7b67107567ef022f154ee
-
SHA256
af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0
-
SHA512
f3be7a2dd70a881e5c845e34221ecde8d130460a6634e776cd27e512ea3fb5604ebd3b5aa65a698fd07f07e89c2a894b84f656e0b304fe883ddb13b69cfafabe
-
SSDEEP
768:7BpZR8fRR1EOrsKrbcYXn9UdDp7Esezzvmw1dJxWxU5:7BPSJRBrsKrbc4WdDp76zLB0u
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\6813A4BF = "C:\\Users\\Admin\\AppData\\Roaming\\6813A4BF\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe 3064 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 1344 wrote to memory of 2148 1344 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 28 PID 2148 wrote to memory of 3064 2148 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 29 PID 2148 wrote to memory of 3064 2148 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 29 PID 2148 wrote to memory of 3064 2148 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 29 PID 2148 wrote to memory of 3064 2148 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 29 PID 2148 wrote to memory of 3064 2148 af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe 29 PID 3064 wrote to memory of 1080 3064 winver.exe 18 PID 3064 wrote to memory of 1044 3064 winver.exe 17 PID 3064 wrote to memory of 1080 3064 winver.exe 18 PID 3064 wrote to memory of 1088 3064 winver.exe 19 PID 3064 wrote to memory of 1176 3064 winver.exe 23
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe"C:\Users\Admin\AppData\Local\Temp\af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe"C:\Users\Admin\AppData\Local\Temp\af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3064
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1176