Managed XDR
Group-IB MDP Report
File info
Filename: c38ae202378b892c4227a9863f6c02c0fe8c5a08ebbf244b72b2220658461d49.eml
File Type: HTML document, ASCII text, with very long lines, with CRLF line terminators
File Size: 702.7 KB
Env info
win7/x86 en
Hashes
SHA1: 95837589d2ed1686cfd4415cef05574ad8eb2516
SHA256: 279a3e1a87705faa14336724845872304e57db6403e6d96786b52d5bf62a75f2
MD5: 7e41647485d499261aa926b6677876a0
Malwares
Tinba
Signatures
Execution
T1204.002 mimics_extension: Attempts to mimic the file extension
T1059.003 executes_dropped_cmd: Executes dropped batch files
T1106 susp_callbacks: Suspicious usage of some WinAPI with callbacks
T1059.003 suspicious_batch: Suspicious batch
Persistence
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1055.012 injection_runpe: Injects code into another process
T1055 injection_failed: The attempt to inject into a process has failed
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1055.012 injection_runpe: Injects code into another process
T1036 copies_utilities: Copies and runs system utility with different name
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1036 mimics_extension: Attempts to mimic the file extension
T1055 injection_failed: The attempt to inject into a process has failed
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Credential Access
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Discovery
T1083 crawls_directories: Opens a huge number of directories all over disk C: (possibly, searches for sensitive data)
T1518 locates_browser: Attempts to identify where browsers are installed
T1016.001 system_network_configuration_discovery: System network configuration discovery detected
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Command and Control
T1102.003 cloud_google: Connects to cloud services of Google (potentially for malicious payload delivery)
T1105 lolbin_extrac32: Download or Copy file with Extrac32
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other
yara_rules: Static rules
executes_dropped_exe: Executes dropped exe files
creates_exe: Creates executable files in the file system
unpacker_wrong_base: Possibly, an error occured in the file unpacker
modifies_certs: Attempts to generate or modify system certificates
create_process_failed: Could not start the process
process_crashed: One of the processes has failed
no_graphical_activity: No graphic activity
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
pe_overlay: PE file contains overlay
enables_execute_access_on_stack: Enable execution access on stack
Managed XDR