Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:27
Behavioral task
behavioral1
Sample
b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
120 seconds
General
-
Target
b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe
-
Size
34KB
-
MD5
fdb8f7f3001e0e4d523fec27c9c7ba34
-
SHA1
b26714a211e68377fe4adcd30487ed5cfb2b28d9
-
SHA256
b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d
-
SHA512
b32d502591903fa2de04afe1b1936b8a1292b86075d60b0ae8e5b1ee2d9af5a957f63f50d6e2ae25c5d3fa0c3af314406c1528f185c104736bfc684af958e005
-
SSDEEP
768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:rpYoX58z1uirL98xMWnT0OQ9JW
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\9C005D2F = "C:\\Users\\Admin\\AppData\\Roaming\\9C005D2F\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2656-0-0x0000000000400000-0x0000000000417000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe 2796 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2796 2656 b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe 31 PID 2656 wrote to memory of 2796 2656 b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe 31 PID 2656 wrote to memory of 2796 2656 b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe 31 PID 2656 wrote to memory of 2796 2656 b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe 31 PID 2656 wrote to memory of 2796 2656 b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe 31 PID 2796 wrote to memory of 1260 2796 winver.exe 21 PID 2796 wrote to memory of 1128 2796 winver.exe 19 PID 2796 wrote to memory of 1184 2796 winver.exe 20 PID 2796 wrote to memory of 1260 2796 winver.exe 21 PID 2796 wrote to memory of 1544 2796 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe"C:\Users\Admin\AppData\Local\Temp\b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1544