Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe
Resource
win10v2004-20241007-en
General
-
Target
313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe
-
Size
610KB
-
MD5
3e35fb39d3b7e7721eca2dfb4cf51c14
-
SHA1
c536e306ebef2ab5b3c68b6fc2e98ab00bd867a3
-
SHA256
313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4
-
SHA512
ddd4fcb103b07398dc5eea58119b69c2b409773659d1a904306a2b358e0cad9c366abf92905ddbff0dc7db1b0af0613e91e0113428f0c39b9350618f3b9b4ea0
-
SSDEEP
12288:9ATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+c:nT+KjUdQqboyyWoK1NGqzuhj
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\3A972576 = "C:\\Users\\Admin\\AppData\\Roaming\\3A972576\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe 2628 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2628 winver.exe 1172 Explorer.EXE 1172 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1172 Explorer.EXE 1172 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2628 2120 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe 30 PID 2120 wrote to memory of 2628 2120 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe 30 PID 2120 wrote to memory of 2628 2120 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe 30 PID 2120 wrote to memory of 2628 2120 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe 30 PID 2120 wrote to memory of 2628 2120 313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe 30 PID 2628 wrote to memory of 1172 2628 winver.exe 21 PID 2628 wrote to memory of 1056 2628 winver.exe 17 PID 2628 wrote to memory of 1072 2628 winver.exe 19 PID 2628 wrote to memory of 1172 2628 winver.exe 21 PID 2628 wrote to memory of 1412 2628 winver.exe 25 PID 2628 wrote to memory of 2120 2628 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1072
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe"C:\Users\Admin\AppData\Local\Temp\313541b3151f9d1c468b775af6aad86f97e085b719be4e776466af81771acef4.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2628
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1412