Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 14:46
Behavioral task
behavioral1
Sample
d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe
Resource
win7-20240903-en
8 signatures
120 seconds
General
-
Target
d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe
-
Size
89KB
-
MD5
f79f9ca6f4ef2d33a2bf7d3813a01ac6
-
SHA1
7d0fbd6e3cfe8d30c426afb120872584c270bf91
-
SHA256
d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73
-
SHA512
bd6bd121837d75e35fca235dcd0c2a82a119252070342667af4e316a483db0a0f0ac331f629fa9ffc6e2ba69dd5b9f07e99e2e8c771132cd3a9d5d4b6a5d731f
-
SSDEEP
1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:L+4MJIkLZJNAQ9Jo9u
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\CE3C4D73 = "C:\\Users\\Admin\\AppData\\Roaming\\CE3C4D73\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x0000000000418000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe 2800 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2800 2484 d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe 31 PID 2484 wrote to memory of 2800 2484 d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe 31 PID 2484 wrote to memory of 2800 2484 d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe 31 PID 2484 wrote to memory of 2800 2484 d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe 31 PID 2484 wrote to memory of 2800 2484 d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe 31 PID 2800 wrote to memory of 1128 2800 winver.exe 20 PID 2800 wrote to memory of 1044 2800 winver.exe 17 PID 2800 wrote to memory of 1068 2800 winver.exe 18 PID 2800 wrote to memory of 1128 2800 winver.exe 20 PID 2800 wrote to memory of 2004 2800 winver.exe 23
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe"C:\Users\Admin\AppData\Local\Temp\d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2800
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2004