Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe
Resource
win10v2004-20241007-en
General
-
Target
2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe
-
Size
225KB
-
MD5
f584e18cc65e94f37b31fb0f8ec753f0
-
SHA1
200da9710322a0589eaf087cae78e50434e40315
-
SHA256
2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975
-
SHA512
e568dff77201324436334e07a5e6d6a27879d69c599fba25ca2910311baf348f7be3c66b31497a194c6ecf1d8904b449871aaab3ccb4e128e38337c37211509c
-
SSDEEP
6144:XA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:XATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\E750EDF9 = "C:\\Users\\Admin\\AppData\\Roaming\\E750EDF9\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe 2620 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2620 1076 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe 31 PID 1076 wrote to memory of 2620 1076 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe 31 PID 1076 wrote to memory of 2620 1076 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe 31 PID 1076 wrote to memory of 2620 1076 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe 31 PID 1076 wrote to memory of 2620 1076 2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe 31 PID 2620 wrote to memory of 1196 2620 winver.exe 21 PID 2620 wrote to memory of 1108 2620 winver.exe 19 PID 2620 wrote to memory of 1164 2620 winver.exe 20 PID 2620 wrote to memory of 1196 2620 winver.exe 21 PID 2620 wrote to memory of 1264 2620 winver.exe 23 PID 2620 wrote to memory of 1076 2620 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe"C:\Users\Admin\AppData\Local\Temp\2f7c5083bd57537adb3f04e5b7f0a81b138c5dd410040bb0be3a0e26905b1975N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2620
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1264