Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe
Resource
win10v2004-20241007-en
General
-
Target
805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe
-
Size
225KB
-
MD5
a18a3f0143dc0e4391277aa63336acd0
-
SHA1
a46abee0532a8478c48b80a4ae95a9079fbef103
-
SHA256
805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78
-
SHA512
2ab4ccc129cfe1cad19cf1e48af575fd2650195d4defd246fb94f4d3a1b99b1778bea3579a24ce401f31e23416663fd520d09cd696f4f904786ff8432de17813
-
SSDEEP
6144:uA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:uATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\E34331EE = "C:\\Users\\Admin\\AppData\\Roaming\\E34331EE\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe 2588 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2588 2196 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe 31 PID 2196 wrote to memory of 2588 2196 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe 31 PID 2196 wrote to memory of 2588 2196 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe 31 PID 2196 wrote to memory of 2588 2196 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe 31 PID 2196 wrote to memory of 2588 2196 805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe 31 PID 2588 wrote to memory of 1204 2588 winver.exe 21 PID 2588 wrote to memory of 1120 2588 winver.exe 19 PID 2588 wrote to memory of 1176 2588 winver.exe 20 PID 2588 wrote to memory of 1204 2588 winver.exe 21 PID 2588 wrote to memory of 1568 2588 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe"C:\Users\Admin\AppData\Local\Temp\805f6a08695dad0d65d18e9e3103ebba8e4bd4589df678152a9a9b2996494c78N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2588
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1568