Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe
Resource
win10v2004-20241007-en
General
-
Target
69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe
-
Size
225KB
-
MD5
130abc6bf67226ded3927fc6e2de8dd6
-
SHA1
49790f07f2523454ce196fd16e38abd928e873f6
-
SHA256
69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5
-
SHA512
3feb21568d9207fec9acee30b1a87c29a457f48ecee860d04a129af9240d94ec33a7269a54bb2e8929948deba224f802d5479ea99266f45dea12f52a2e7f189d
-
SSDEEP
6144:9A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:9ATuTAnKGwUAW3ycQqgX
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\968FA10C = "C:\\Users\\Admin\\AppData\\Roaming\\968FA10C\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe 2836 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2836 2548 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe 29 PID 2548 wrote to memory of 2836 2548 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe 29 PID 2548 wrote to memory of 2836 2548 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe 29 PID 2548 wrote to memory of 2836 2548 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe 29 PID 2548 wrote to memory of 2836 2548 69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe 29 PID 2836 wrote to memory of 1212 2836 winver.exe 20 PID 2836 wrote to memory of 1120 2836 winver.exe 18 PID 2836 wrote to memory of 1176 2836 winver.exe 19 PID 2836 wrote to memory of 1212 2836 winver.exe 20 PID 2836 wrote to memory of 1244 2836 winver.exe 24 PID 2836 wrote to memory of 2548 2836 winver.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe"C:\Users\Admin\AppData\Local\Temp\69096cafdb82598aa14f22d3404dd5f59d131d186ddc791d0c6b7f698c69e7f5.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2836
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1244