Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 01:31
Behavioral task
behavioral1
Sample
a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe
Resource
win7-20240903-en
8 signatures
120 seconds
General
-
Target
a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe
-
Size
113KB
-
MD5
32d01a5aa09c4f78b7b4fdad5d9ec8c0
-
SHA1
d86590ce6719fd609fa3c0a1f5577726807fb465
-
SHA256
a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839c
-
SHA512
ff5e2ddf8a47a514b1766d4158c7b9e4f731f2692cec07f13b2dcd2d576e734ab7d630730c370c6e03cfd163fce4be92b346a2df90fbfda99a4f585e05cecb15
-
SSDEEP
1536:BiLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0E:BiyvRmDLs/ZrwWjjAqGcfzWH
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\B09E57A9 = "C:\\Users\\Admin\\AppData\\Roaming\\B09E57A9\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe 1972 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1972 2308 a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe 32 PID 2308 wrote to memory of 1972 2308 a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe 32 PID 2308 wrote to memory of 1972 2308 a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe 32 PID 2308 wrote to memory of 1972 2308 a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe 32 PID 2308 wrote to memory of 1972 2308 a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe 32 PID 1972 wrote to memory of 1192 1972 winver.exe 21 PID 1972 wrote to memory of 1104 1972 winver.exe 19 PID 1972 wrote to memory of 1164 1972 winver.exe 20 PID 1972 wrote to memory of 1192 1972 winver.exe 21 PID 1972 wrote to memory of 1312 1972 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe"C:\Users\Admin\AppData\Local\Temp\a47a7ef6547ef1feeffaf7093a72dd28ccc7294e35c0af536df1a9dc2052839cN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1312