Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 08:49
Behavioral task
behavioral1
Sample
711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe
Resource
win7-20240729-en
windows7-x64
8 signatures
120 seconds
General
-
Target
711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe
-
Size
45KB
-
MD5
5f8c9198fae03caf76faa7bbc42bae10
-
SHA1
44e73cb28c0db2be25628f8ce6b42c0b45e51a6e
-
SHA256
711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19
-
SHA512
8813201ae63d41f28b4f3f8f2dbc6e14e48dfc632fad9b8c7427979dea1a4974dc16b3ec1bd51f45007cd836995e824d18899e1342c8d52b814ccb189570683e
-
SSDEEP
768:uhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:isWE9N5dFu53dsniQaB/xZ14n7zIF+qh
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\1959CC0A = "C:\\Users\\Admin\\AppData\\Roaming\\1959CC0A\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2384-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe 2544 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2544 2384 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe 31 PID 2384 wrote to memory of 2544 2384 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe 31 PID 2384 wrote to memory of 2544 2384 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe 31 PID 2384 wrote to memory of 2544 2384 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe 31 PID 2384 wrote to memory of 2544 2384 711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe 31 PID 2544 wrote to memory of 1208 2544 winver.exe 21 PID 2544 wrote to memory of 1076 2544 winver.exe 18 PID 2544 wrote to memory of 1168 2544 winver.exe 20 PID 2544 wrote to memory of 1208 2544 winver.exe 21 PID 2544 wrote to memory of 1800 2544 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe"C:\Users\Admin\AppData\Local\Temp\711e5f7d02ea3c0ea025766056876ef5cadaab58e76f611de5e0ef39b3e2fb19N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2544
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1800