Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 20:40
Behavioral task
behavioral1
Sample
ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe
Resource
win7-20241023-en
windows7-x64
8 signatures
120 seconds
General
-
Target
ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe
-
Size
110KB
-
MD5
0e2508ec7472735d63ab8363d70696f0
-
SHA1
a2786c5785c51e143e22cabf4c10cf0dea80646f
-
SHA256
ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055
-
SHA512
c6834619094485642ada3d23ad21b26af621bbd7885f2dc14caf9611fe3921fb16963d940d73b998fbd9bb957358131898659f200b59035bee3dd852efabc845
-
SSDEEP
1536:jiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:jiyvRmDLs/ZrwWJjAqGcRJ2hg
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\49B72947 = "C:\\Users\\Admin\\AppData\\Roaming\\49B72947\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2616-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe 2356 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2356 2616 ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe 31 PID 2616 wrote to memory of 2356 2616 ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe 31 PID 2616 wrote to memory of 2356 2616 ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe 31 PID 2616 wrote to memory of 2356 2616 ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe 31 PID 2616 wrote to memory of 2356 2616 ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe 31 PID 2356 wrote to memory of 1208 2356 winver.exe 21 PID 2356 wrote to memory of 1112 2356 winver.exe 19 PID 2356 wrote to memory of 1184 2356 winver.exe 20 PID 2356 wrote to memory of 1208 2356 winver.exe 21 PID 2356 wrote to memory of 1532 2356 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe"C:\Users\Admin\AppData\Local\Temp\ac198520eb1edd75e61f90a4cd8085e8820684c7bb8bc13750f9b63825562055N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2356
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1532