Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe
Resource
win10v2004-20241007-en
General
-
Target
3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe
-
Size
610KB
-
MD5
a7118906383a4d99247b2c4e0280f3e0
-
SHA1
14ee7d994672149d377e238ddd0d07597e249416
-
SHA256
3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1b
-
SHA512
b041740132f99c1d18029202896ceb4a7833b01fd9f325d82d202bc16f6f21f4e39747c167c1e20e13015967f5f241130e805310c20c42f17dda1540f39e97ef
-
SSDEEP
12288:OATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+E:gT+KjUdQqboyyWoK1NGqzuhx
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\13CC36D0 = "C:\\Users\\Admin\\AppData\\Roaming\\13CC36D0\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe 2820 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2820 2584 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe 31 PID 2584 wrote to memory of 2820 2584 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe 31 PID 2584 wrote to memory of 2820 2584 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe 31 PID 2584 wrote to memory of 2820 2584 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe 31 PID 2584 wrote to memory of 2820 2584 3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe 31 PID 2820 wrote to memory of 1284 2820 winver.exe 21 PID 2820 wrote to memory of 1116 2820 winver.exe 19 PID 2820 wrote to memory of 1188 2820 winver.exe 20 PID 2820 wrote to memory of 1284 2820 winver.exe 21 PID 2820 wrote to memory of 916 2820 winver.exe 25 PID 2820 wrote to memory of 2584 2820 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe"C:\Users\Admin\AppData\Local\Temp\3a75fdf4ebd7ef4b435f79a2865353112b63ffee4e747878c751d40fe26b5d1bN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2820
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:916