Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe
Resource
win10v2004-20241007-en
General
-
Target
358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe
-
Size
59KB
-
MD5
2c43c4ae1e567ea15f1e08b73a1903f0
-
SHA1
aea8eb4936265f4a44178285f316deb2d7651d33
-
SHA256
358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57e
-
SHA512
1346084be4daeb971659487e5bc53b296d2158d49b0c696e2357a03854006635a751ebd52a400f1d74a686e742fcc0a3082b2c11b55bd776006c28188fe37762
-
SSDEEP
768:M+6p+OMlgGMCWhfDzU7f7JDgiFP7xI57+sByZ+XsfXpwtGc9JH:M+mFM2HXKZgiFP7xIksu+XM5O9JH
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\7977401A = "C:\\Users\\Admin\\AppData\\Roaming\\7977401A\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe 2396 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2396 2672 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe 31 PID 2672 wrote to memory of 2396 2672 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe 31 PID 2672 wrote to memory of 2396 2672 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe 31 PID 2672 wrote to memory of 2396 2672 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe 31 PID 2672 wrote to memory of 2396 2672 358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe 31 PID 2396 wrote to memory of 1240 2396 winver.exe 21 PID 2396 wrote to memory of 1120 2396 winver.exe 19 PID 2396 wrote to memory of 1176 2396 winver.exe 20 PID 2396 wrote to memory of 1240 2396 winver.exe 21 PID 2396 wrote to memory of 1352 2396 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe"C:\Users\Admin\AppData\Local\Temp\358e58e7e260bc8c3bbe701d92240b81aa846cba37dbf700b571fa0bb5f4c57eN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2396
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1352