Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 16:57
Static task
static1
Behavioral task
behavioral1
Sample
9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe
Resource
win10v2004-20241007-en
General
-
Target
9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe
-
Size
610KB
-
MD5
269110ce3bea5a2d0ed3f3fb24a66aa0
-
SHA1
eae57a34b320659991576f52c06e58ebf42a8a66
-
SHA256
9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208
-
SHA512
9d9d82d67c78443078780bbacf9ad4a669613da25fa5f1858cdfd0d29cc0fa914098c2a564c22a88f81556e4fb2da6ce605ca7272f5f14063f530d373912f417
-
SSDEEP
12288:CATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+E:8T+KjUdQqboyyWoK1NGqzuhR
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\175D7B74 = "C:\\Users\\Admin\\AppData\\Roaming\\175D7B74\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe 2904 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2904 1740 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe 31 PID 1740 wrote to memory of 2904 1740 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe 31 PID 1740 wrote to memory of 2904 1740 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe 31 PID 1740 wrote to memory of 2904 1740 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe 31 PID 1740 wrote to memory of 2904 1740 9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe 31 PID 2904 wrote to memory of 1240 2904 winver.exe 21 PID 2904 wrote to memory of 1128 2904 winver.exe 19 PID 2904 wrote to memory of 1192 2904 winver.exe 20 PID 2904 wrote to memory of 1240 2904 winver.exe 21 PID 2904 wrote to memory of 864 2904 winver.exe 23 PID 2904 wrote to memory of 1740 2904 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe"C:\Users\Admin\AppData\Local\Temp\9850554e0329955f43cbbd816272bfa650bcad36b297cce4127b45c5c869c208N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:864