Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
Resource
win10v2004-20250217-en
General
-
Target
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
-
Size
112KB
-
MD5
dc44464edda6fe8cda58153734080dfc
-
SHA1
762391595db2c2de81832cc8f3914e6b905bd546
-
SHA256
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70
-
SHA512
446243302a9cd8039f7be571dda6608275e6a41159c732e13a70e9b7da2698ac238e959a3430df8fa9be2de31b3babc4802cd9a2c7fc4e252c19fc9e22c07238
-
SSDEEP
3072:/afe8iokAMMKzU2YAPNAQxxlNk3Um/u1hp13JeoSG:/afviokAMMohe3UmG1hpeoSG
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\96082DAE = "C:\\Users\\Admin\\AppData\\Roaming\\96082DAE\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2212 set thread context of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe 1340 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 winver.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2212 wrote to memory of 2188 2212 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2188 wrote to memory of 1340 2188 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2188 wrote to memory of 1340 2188 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2188 wrote to memory of 1340 2188 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2188 wrote to memory of 1340 2188 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2188 wrote to memory of 1340 2188 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 1340 wrote to memory of 1208 1340 winver.exe 21 PID 1340 wrote to memory of 1112 1340 winver.exe 19 PID 1340 wrote to memory of 1168 1340 winver.exe 20 PID 1340 wrote to memory of 1208 1340 winver.exe 21 PID 1340 wrote to memory of 1268 1340 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe"C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exeC:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1340
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1268