Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe
Resource
win10v2004-20241007-en
General
-
Target
f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe
-
Size
610KB
-
MD5
7c9526c1c5c19fb3c23f696add94d7a0
-
SHA1
6dfd0273613b943e55c25068747ea7f2569c8cb9
-
SHA256
f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40e
-
SHA512
1126b086c7cdf5c9a0ddca8d2f8cd22d55027cb8efa099713da7810376ffb6e1dcf8160421308a5e550cfcbc60ee67500bc68d9bd460bc656037aec8e9ac222f
-
SSDEEP
12288:bATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+c:ZT+KjUdQqboyyWoK1NGqzuhb
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\AB3787C1 = "C:\\Users\\Admin\\AppData\\Roaming\\AB3787C1\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe 2860 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2860 winver.exe 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2860 2212 f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe 31 PID 2212 wrote to memory of 2860 2212 f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe 31 PID 2212 wrote to memory of 2860 2212 f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe 31 PID 2212 wrote to memory of 2860 2212 f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe 31 PID 2212 wrote to memory of 2860 2212 f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe 31 PID 2860 wrote to memory of 1236 2860 winver.exe 21 PID 2860 wrote to memory of 1116 2860 winver.exe 19 PID 2860 wrote to memory of 1172 2860 winver.exe 20 PID 2860 wrote to memory of 1236 2860 winver.exe 21 PID 2860 wrote to memory of 500 2860 winver.exe 23 PID 2860 wrote to memory of 2212 2860 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe"C:\Users\Admin\AppData\Local\Temp\f81f4cabe23b48775f8e1efda0b52f5796f7d486296dde1c000d591c58ebd40eN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2860
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:500