Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe
Resource
win10v2004-20241007-en
General
-
Target
53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe
-
Size
237KB
-
MD5
f0b2a451a3b7faafc99c9f63d0a4a010
-
SHA1
3463e18c3603b8d1f2a6ebb3bedebc8a33e224f1
-
SHA256
53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8
-
SHA512
39e00ee97cb258b93ba0d4a7ee6d0aeeed1a2ef76d630b2dbc61bda7a50809ba680cb2029ffc99ac6c7791eccd8b7d4952b942f82896ab19c5959dc389fe586f
-
SSDEEP
6144:TA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYA:TATuTAnKGwUAWVycQqgR
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\3B762055 = "C:\\Users\\Admin\\AppData\\Roaming\\3B762055\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe 2832 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2832 winver.exe 1140 Explorer.EXE 1140 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1140 Explorer.EXE 1140 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2832 1620 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe 31 PID 1620 wrote to memory of 2832 1620 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe 31 PID 1620 wrote to memory of 2832 1620 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe 31 PID 1620 wrote to memory of 2832 1620 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe 31 PID 1620 wrote to memory of 2832 1620 53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe 31 PID 2832 wrote to memory of 1140 2832 winver.exe 20 PID 2832 wrote to memory of 1056 2832 winver.exe 18 PID 2832 wrote to memory of 1100 2832 winver.exe 19 PID 2832 wrote to memory of 1140 2832 winver.exe 20 PID 2832 wrote to memory of 1508 2832 winver.exe 25 PID 2832 wrote to memory of 1620 2832 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1100
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe"C:\Users\Admin\AppData\Local\Temp\53666cd2d6f800f874f6ab3c7fcec7ba780dcd88c3ed0312d941e65bc4d267d8N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2832
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1508