Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
Resource
win10v2004-20250217-en
General
-
Target
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe
-
Size
112KB
-
MD5
dc44464edda6fe8cda58153734080dfc
-
SHA1
762391595db2c2de81832cc8f3914e6b905bd546
-
SHA256
b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70
-
SHA512
446243302a9cd8039f7be571dda6608275e6a41159c732e13a70e9b7da2698ac238e959a3430df8fa9be2de31b3babc4802cd9a2c7fc4e252c19fc9e22c07238
-
SSDEEP
3072:/afe8iokAMMKzU2YAPNAQxxlNk3Um/u1hp13JeoSG:/afviokAMMohe3UmG1hpeoSG
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\C3797A08 = "C:\\Users\\Admin\\AppData\\Roaming\\C3797A08\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe 1136 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1136 winver.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 3012 wrote to memory of 2556 3012 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 30 PID 2556 wrote to memory of 1136 2556 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2556 wrote to memory of 1136 2556 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2556 wrote to memory of 1136 2556 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2556 wrote to memory of 1136 2556 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 2556 wrote to memory of 1136 2556 b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe 31 PID 1136 wrote to memory of 1192 1136 winver.exe 21 PID 1136 wrote to memory of 1112 1136 winver.exe 19 PID 1136 wrote to memory of 1156 1136 winver.exe 20 PID 1136 wrote to memory of 1192 1136 winver.exe 21 PID 1136 wrote to memory of 1600 1136 winver.exe 25 PID 1136 wrote to memory of 2556 1136 winver.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe"C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exeC:\Users\Admin\AppData\Local\Temp\b7764a1955a6c2b27e90e70ae0f32b1722ab13a14e5b74ad40b1612ab4685c70.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1136
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600