Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 06:31
Behavioral task
behavioral1
Sample
a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe
Resource
win7-20240903-en
8 signatures
120 seconds
General
-
Target
a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe
-
Size
44KB
-
MD5
f0831fa5ef2a1211c6e70b80660381d0
-
SHA1
f76670698680dcdee046ddabeb8696eeffed51de
-
SHA256
a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4c
-
SHA512
566d5057ce0e2220b3f949fe5ae99e0901b5e07ed33bece8b37d683bde04c6661925c63b420a6adbb7c8cb487b1329db9597dd1a316a74d88db1c34a3cd663ec
-
SSDEEP
768:8a+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:8a+vM4ld+TR26qZxbhO3IM
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\5583ACAF = "C:\\Users\\Admin\\AppData\\Roaming\\5583ACAF\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2636-0-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe 2764 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2764 2636 a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe 31 PID 2636 wrote to memory of 2764 2636 a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe 31 PID 2636 wrote to memory of 2764 2636 a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe 31 PID 2636 wrote to memory of 2764 2636 a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe 31 PID 2636 wrote to memory of 2764 2636 a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe 31 PID 2764 wrote to memory of 1212 2764 winver.exe 21 PID 2764 wrote to memory of 1116 2764 winver.exe 19 PID 2764 wrote to memory of 1172 2764 winver.exe 20 PID 2764 wrote to memory of 1212 2764 winver.exe 21 PID 2764 wrote to memory of 1444 2764 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe"C:\Users\Admin\AppData\Local\Temp\a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2764
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1444