Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe
Resource
win10v2004-20241007-en
General
-
Target
217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe
-
Size
610KB
-
MD5
7e7c626c0cd3310357d417b6dcfb37dc
-
SHA1
9bfab2c6a4e78528020d0a2ded44291bf824d8ff
-
SHA256
217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f
-
SHA512
6de2fa4f621a164e4c8d986422fc533442bf1b632a38927a6a0363676ac6bfda959f94e0ded2e1bacf18f283a448c7fdec67d65286ef224a0c93b8c6c23a3633
-
SSDEEP
12288:iATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+E:cT+KjUdQqboyyWoK1NGqzuh5
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\4F7DB8B1 = "C:\\Users\\Admin\\AppData\\Roaming\\4F7DB8B1\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe 2132 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2132 1388 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe 31 PID 1388 wrote to memory of 2132 1388 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe 31 PID 1388 wrote to memory of 2132 1388 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe 31 PID 1388 wrote to memory of 2132 1388 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe 31 PID 1388 wrote to memory of 2132 1388 217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe 31 PID 2132 wrote to memory of 1188 2132 winver.exe 21 PID 2132 wrote to memory of 1100 2132 winver.exe 19 PID 2132 wrote to memory of 1160 2132 winver.exe 20 PID 2132 wrote to memory of 1188 2132 winver.exe 21 PID 2132 wrote to memory of 1028 2132 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe"C:\Users\Admin\AppData\Local\Temp\217948f502f29fdf931d8c0a8b8abbb0458a57758f8b1e913120e591a9229c9f.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2132
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1028