Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe
Resource
win10v2004-20241007-en
General
-
Target
5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe
-
Size
610KB
-
MD5
4357be46b6ff67d76506c7b32480fa8a
-
SHA1
93d9c7cc18d87f40e1ff387c65c5d795be12bd57
-
SHA256
5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2
-
SHA512
ee0fcd9252a51d513e19e252cf95e72df90a2ac644759fa9446b30bbd6182840ac02e13ccb806252570a73c561bd11aa7cb651075ff7734929926dc8af1ac1fa
-
SSDEEP
12288:UATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+c:KT+KjUdQqboyyWoK1NGqzuhT
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\B76024C8 = "C:\\Users\\Admin\\AppData\\Roaming\\B76024C8\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe 2596 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2596 2644 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe 30 PID 2644 wrote to memory of 2596 2644 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe 30 PID 2644 wrote to memory of 2596 2644 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe 30 PID 2644 wrote to memory of 2596 2644 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe 30 PID 2644 wrote to memory of 2596 2644 5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe 30 PID 2596 wrote to memory of 1180 2596 winver.exe 21 PID 2596 wrote to memory of 1068 2596 winver.exe 18 PID 2596 wrote to memory of 1084 2596 winver.exe 19 PID 2596 wrote to memory of 1180 2596 winver.exe 21 PID 2596 wrote to memory of 620 2596 winver.exe 23 PID 2596 wrote to memory of 2644 2596 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1084
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe"C:\Users\Admin\AppData\Local\Temp\5212a1a42d6a62656577d2f45b34f623b4789a88c87a0abe755828be20d533e2.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2596
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:620