Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 22:43

General

  • Target

    6e1fe431a13dfd68e98997d3b0586dd3cc96f3ab870fcbaab17dd5a81996f9bf.exe

  • Size

    128KB

  • MD5

    a86367a258bb28cfe17edd9258663258

  • SHA1

    2c4aee944cbe09f8bc9619327bfa8b44ad757e87

  • SHA256

    6e1fe431a13dfd68e98997d3b0586dd3cc96f3ab870fcbaab17dd5a81996f9bf

  • SHA512

    94695408f8e78bc36c6dcc63b00ed0fd340fb56fbcaa3317d725f2dfaa70e902f4c925bc8f92c303df1ee66a38e1c0d7b0dfb6041aae53476cbeeec4dfc55dfc

  • SSDEEP

    3072:bayUZwQNxPXO7o4m3TRXimW2wS7IrHrYj:2yU/NxPXcmRSmHwMOHm

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 8 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e1fe431a13dfd68e98997d3b0586dd3cc96f3ab870fcbaab17dd5a81996f9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\6e1fe431a13dfd68e98997d3b0586dd3cc96f3ab870fcbaab17dd5a81996f9bf.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\Dmbcen32.exe
      C:\Windows\system32\Dmbcen32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\Dpapaj32.exe
        C:\Windows\system32\Dpapaj32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 144
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Dmbcen32.exe

    Filesize

    128KB

    MD5

    3b1e993288067e7b8c3aa5eca1b13ac0

    SHA1

    a45eb113d75175769bd47695e1c8469eb6ca2dae

    SHA256

    9d476a0711c71231357152bab9b37d328437b6bf3e74c432a7d142d967f8a202

    SHA512

    f612ec5297547992f6eaa743e6f07ab32157584a1bf2984a7b49ca295b6719f800af39dfe9d9ff43eba8565a3b74157859792ad70c6c781e133efa7a9d8e2b4a

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    128KB

    MD5

    868a0687a401169d31f064b1790be2bc

    SHA1

    084e6bdac0d300c3c8bbe3e8e03bc1c064addaf3

    SHA256

    0438b3aef2b4111e088d484ffebef017c50790e768852f0e78f39d8f323d4610

    SHA512

    707d31359eee346a49f368f9a67f6f46c7981bd1aa5617ccb2266970a941a3f7e3706421ac322fabe4101a515e5201cf52f3f50b56ba963ab55bf6e69cb565c6

  • memory/1040-28-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1040-37-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2688-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2688-12-0x0000000000440000-0x0000000000480000-memory.dmp

    Filesize

    256KB

  • memory/2688-35-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2848-13-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2848-27-0x0000000000250000-0x0000000000290000-memory.dmp

    Filesize

    256KB

  • memory/2848-26-0x0000000000250000-0x0000000000290000-memory.dmp

    Filesize

    256KB

  • memory/2848-36-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB