Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe
Resource
win10v2004-20250207-en
General
-
Target
2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe
-
Size
225KB
-
MD5
cb4ff02eabebb0efb72861f2f6054e17
-
SHA1
efbe406f961e2af6bff04d43b4229fd12a55076a
-
SHA256
2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6
-
SHA512
6472b9059f7a2217f48a7e01e635ec5a7bca6f124b9371cc92f2b83aecfa93d14a67ba74742100af357fd9649b1e83a72b369afd36dbdd48e7f7e832920082fd
-
SSDEEP
6144:nA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:nATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\51BCE63D = "C:\\Users\\Admin\\AppData\\Roaming\\51BCE63D\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe 2656 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2656 2976 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe 31 PID 2976 wrote to memory of 2656 2976 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe 31 PID 2976 wrote to memory of 2656 2976 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe 31 PID 2976 wrote to memory of 2656 2976 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe 31 PID 2976 wrote to memory of 2656 2976 2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe 31 PID 2656 wrote to memory of 1200 2656 winver.exe 21 PID 2656 wrote to memory of 1112 2656 winver.exe 19 PID 2656 wrote to memory of 1172 2656 winver.exe 20 PID 2656 wrote to memory of 1200 2656 winver.exe 21 PID 2656 wrote to memory of 1196 2656 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe"C:\Users\Admin\AppData\Local\Temp\2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2656
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1196