Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe
Resource
win10v2004-20241007-en
General
-
Target
ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe
-
Size
59KB
-
MD5
a7b271e92e88b1cbdb7c78301b52ec90
-
SHA1
43329afe49ed21b0ad91f64c0c88b5df3cf007b5
-
SHA256
ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51
-
SHA512
2da642f78fe4218530c2ab63557ece7ce15fc5c42c70a6dabb9b0a58fe5dcd681d54e7dd42e7ba80f28452baa15d7429e64ccfdb726bcde1f12dcc22b2f3a9bb
-
SSDEEP
768:w+6p+OMlgGMCWhfDzU7f7JDgiFP7xI57+sByZ+XsfXpwtGc9J1:w+mFM2HXKZgiFP7xIksu+XM5O9J1
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\AFD83225 = "C:\\Users\\Admin\\AppData\\Roaming\\AFD83225\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2356 2416 ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe 31 PID 2416 wrote to memory of 2356 2416 ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe 31 PID 2416 wrote to memory of 2356 2416 ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe 31 PID 2416 wrote to memory of 2356 2416 ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe 31 PID 2416 wrote to memory of 2356 2416 ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe 31 PID 2356 wrote to memory of 1208 2356 winver.exe 21 PID 2356 wrote to memory of 1112 2356 winver.exe 19 PID 2356 wrote to memory of 1184 2356 winver.exe 20 PID 2356 wrote to memory of 1208 2356 winver.exe 21 PID 2356 wrote to memory of 1532 2356 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe"C:\Users\Admin\AppData\Local\Temp\ceb02ba49173458a28ab79b0689214496540f7cb126fb27444a1498ab5fb5d51N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2356
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1532