Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 20:46
Behavioral task
behavioral1
Sample
a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
120 seconds
General
-
Target
a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe
-
Size
160KB
-
MD5
e646df836ef45f4238471451c3cfffd0
-
SHA1
da1760eddb0240acde196e91b8634a7027c49091
-
SHA256
a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09
-
SHA512
062805b13416b874be0235225c5ceb4f0361a2391cc842d6b91a2c67b7bc709511ba72d6e06fcf208c61b94edbd60c0c8e766313ec3712a9e83a7482ad43de7b
-
SSDEEP
1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:TY+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\F2CFC1AE = "C:\\Users\\Admin\\AppData\\Roaming\\F2CFC1AE\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/1908-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2688 1908 a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe 31 PID 1908 wrote to memory of 2688 1908 a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe 31 PID 1908 wrote to memory of 2688 1908 a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe 31 PID 1908 wrote to memory of 2688 1908 a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe 31 PID 1908 wrote to memory of 2688 1908 a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe 31 PID 2688 wrote to memory of 1204 2688 winver.exe 21 PID 2688 wrote to memory of 1112 2688 winver.exe 19 PID 2688 wrote to memory of 1164 2688 winver.exe 20 PID 2688 wrote to memory of 1204 2688 winver.exe 21 PID 2688 wrote to memory of 1656 2688 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe"C:\Users\Admin\AppData\Local\Temp\a13b975b0415d3e9083cec71d6727859a1c2816a1d289be05f9a3f2a2e962c09N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1656