Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe
Resource
win10v2004-20241007-en
General
-
Target
154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe
-
Size
237KB
-
MD5
e8aad678d9b78b481a69676f5a7fb660
-
SHA1
077b4ada1bdb042ca367d616e30259fde90f3a71
-
SHA256
154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03f
-
SHA512
c64bab8575fe59e5b66f373b2e2a74e756547c0ccdfd1f3b5a77167e49581b93195f0821c0ef7836350e37f43c869fe087e477c37397910138cbfb32d04daf87
-
SSDEEP
6144:zA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:zATuTAnKGwUAWVycQqgj
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\CDB5C13C = "C:\\Users\\Admin\\AppData\\Roaming\\CDB5C13C\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe 2868 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 632 wrote to memory of 2868 632 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe 31 PID 632 wrote to memory of 2868 632 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe 31 PID 632 wrote to memory of 2868 632 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe 31 PID 632 wrote to memory of 2868 632 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe 31 PID 632 wrote to memory of 2868 632 154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe 31 PID 2868 wrote to memory of 1236 2868 winver.exe 21 PID 2868 wrote to memory of 1120 2868 winver.exe 19 PID 2868 wrote to memory of 1184 2868 winver.exe 20 PID 2868 wrote to memory of 1236 2868 winver.exe 21 PID 2868 wrote to memory of 1288 2868 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe"C:\Users\Admin\AppData\Local\Temp\154ebc6e51d30fc88bd92b19485cbabfaab3526b71ad36d78c40e4612943c03fN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2868
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288