Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 21:45
Behavioral task
behavioral1
Sample
2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe
Resource
win7-20240708-en
8 signatures
150 seconds
General
-
Target
2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe
-
Size
45KB
-
MD5
9971a40ee69ca382baecff9c8ba9d5b6
-
SHA1
6041e2d0fc89f991c6c3ad395bc6b77c5d283c26
-
SHA256
2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af
-
SHA512
debb6ccf2ec56980dcd7d8b4bc0aea9b5c205e2e40ce900bfd6222e25bb10061f1ef3a3a425d72f51ba781b0eb0236e82bce9b7cfd9139ca3f559f99431c410e
-
SSDEEP
768:4hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:EsWE9N5dFu53dsniQaB/xZ14n7zIF+qh
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\4C234650 = "C:\\Users\\Admin\\AppData\\Roaming\\4C234650\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/3040-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe 2364 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2364 3040 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe 31 PID 3040 wrote to memory of 2364 3040 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe 31 PID 3040 wrote to memory of 2364 3040 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe 31 PID 3040 wrote to memory of 2364 3040 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe 31 PID 3040 wrote to memory of 2364 3040 2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe 31 PID 2364 wrote to memory of 1180 2364 winver.exe 21 PID 2364 wrote to memory of 1108 2364 winver.exe 19 PID 2364 wrote to memory of 1152 2364 winver.exe 20 PID 2364 wrote to memory of 1180 2364 winver.exe 21 PID 2364 wrote to memory of 464 2364 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe"C:\Users\Admin\AppData\Local\Temp\2520bf079803f2e8636afcd749295d18db164ed3e13e9d4f0ccd7693507bd9af.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2364
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:464