Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 01:00
Static task
static1
Behavioral task
behavioral1
Sample
d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe
Resource
win10v2004-20250207-en
General
-
Target
d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe
-
Size
54KB
-
MD5
2b8717d636eb87a3a24d4b1e8cf7e4c0
-
SHA1
9086a93063a74f23a8f785f42319161792abd7f1
-
SHA256
d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3
-
SHA512
97c33de02c8ffd06d2d55a71b8e62fff9ea384ae53a675f012ae4f9e17d23c6aed90daf70b71b440f5e658f508bfb15f21170f95f3c246c4d47e53c590f342b0
-
SSDEEP
768:O3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:G5tPusSRJDTlLTOpJiaDjts4gfFi2+A
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\A60CEF45 = "C:\\Users\\Admin\\AppData\\Roaming\\A60CEF45\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe 2000 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2280 wrote to memory of 2548 2280 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 29 PID 2548 wrote to memory of 2000 2548 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 30 PID 2548 wrote to memory of 2000 2548 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 30 PID 2548 wrote to memory of 2000 2548 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 30 PID 2548 wrote to memory of 2000 2548 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 30 PID 2548 wrote to memory of 2000 2548 d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe 30 PID 2000 wrote to memory of 1364 2000 winver.exe 20 PID 2000 wrote to memory of 1212 2000 winver.exe 18 PID 2000 wrote to memory of 1300 2000 winver.exe 19 PID 2000 wrote to memory of 1364 2000 winver.exe 20 PID 2000 wrote to memory of 1124 2000 winver.exe 22
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1212
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe"C:\Users\Admin\AppData\Local\Temp\d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe"C:\Users\Admin\AppData\Local\Temp\d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2000
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1124