Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe
Resource
win10v2004-20241007-en
General
-
Target
946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe
-
Size
225KB
-
MD5
c1a48ae089ea54f1b33a0b962ccba1a5
-
SHA1
195e90982a86fc33f33f9991a27a371ad0142d81
-
SHA256
946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a
-
SHA512
7c08ef9f020bf4b484d2755a23411a345fb17e1530ce4f5b82b50976ccac36f9dbe3e6ef60e1d58cf2d044fc12ee7f5bed6cbbf69945224e53ed594ce824d710
-
SSDEEP
6144:uA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpY0:uATuTAnKGwUAW3ycQqgV
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\26CDE62B = "C:\\Users\\Admin\\AppData\\Roaming\\26CDE62B\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2836 2352 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe 31 PID 2352 wrote to memory of 2836 2352 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe 31 PID 2352 wrote to memory of 2836 2352 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe 31 PID 2352 wrote to memory of 2836 2352 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe 31 PID 2352 wrote to memory of 2836 2352 946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe 31 PID 2836 wrote to memory of 1184 2836 winver.exe 21 PID 2836 wrote to memory of 1052 2836 winver.exe 17 PID 2836 wrote to memory of 1104 2836 winver.exe 19 PID 2836 wrote to memory of 1184 2836 winver.exe 21 PID 2836 wrote to memory of 884 2836 winver.exe 25 PID 2836 wrote to memory of 2352 2836 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1052
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe"C:\Users\Admin\AppData\Local\Temp\946305dcf8212b72610e9d526e424d303ef3a2ffeac6720903203e22d2ae0b4a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2836
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:884