Analysis

  • max time kernel
    83s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:49

General

  • Target

    9508c09d7dfb89931ad49cacba2daf4b3f306303c2815af7f07bc63ffaffb002N.exe

  • Size

    1.3MB

  • MD5

    e6b86417530e1cc04f5c8223f71b5d40

  • SHA1

    1473c0734d53ef5c569f9de20926affaafef7615

  • SHA256

    9508c09d7dfb89931ad49cacba2daf4b3f306303c2815af7f07bc63ffaffb002

  • SHA512

    974c1a30ac3613ea138ebbbec982088161bd3f5f9ccdbbe0908be31eb948c4e9568442e6670c9ead8aa4b8afdbdd056e38d2b7a2c16b2d6ddd46413f326f2f67

  • SSDEEP

    12288:y7iOi2Nvpm05XEvG6IveDVqvQ6IvYvc6IveDVqvQ6IvIn+v7vc6IveDVqvQ6Iv5P:/6X1q5h3q5hkntq5hU6X1q5h3q5h5p

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 17 IoCs
  • Drops file in System32 directory 23 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9508c09d7dfb89931ad49cacba2daf4b3f306303c2815af7f07bc63ffaffb002N.exe
    "C:\Users\Admin\AppData\Local\Temp\9508c09d7dfb89931ad49cacba2daf4b3f306303c2815af7f07bc63ffaffb002N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\Bmpkqklh.exe
      C:\Windows\system32\Bmpkqklh.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\Bbmcibjp.exe
        C:\Windows\system32\Bbmcibjp.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\SysWOW64\Cagienkb.exe
          C:\Windows\system32\Cagienkb.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\SysWOW64\Cchbgi32.exe
            C:\Windows\system32\Cchbgi32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Windows\SysWOW64\Cjakccop.exe
              C:\Windows\system32\Cjakccop.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2984
              • C:\Windows\SysWOW64\Cgfkmgnj.exe
                C:\Windows\system32\Cgfkmgnj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2916
                • C:\Windows\SysWOW64\Dpapaj32.exe
                  C:\Windows\system32\Dpapaj32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2772
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 144
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Cagienkb.exe

    Filesize

    1.3MB

    MD5

    e0865f444d4adbfaba928abe456fa89c

    SHA1

    932a06a144cff818fffeae33c9b5bf580d68a436

    SHA256

    ee0d70211a44ce06d338cd5bcd3880b585d25c4d104a20cebba21bd270c673af

    SHA512

    7cee0946df9315ec6f069ecea70914778650594fed74f6368eb13a3c46c38683ebc322b82120488d00376c20be6526e5009f5e16ad9680f77e8b54bb324f085d

  • C:\Windows\SysWOW64\Cchbgi32.exe

    Filesize

    1.3MB

    MD5

    42000c4f0f064f1574a28c197d027236

    SHA1

    c3346c82733a0eb731c564db83fdf15ee28b2bd7

    SHA256

    75a1c7060682f8399b1653c67bfe1dbba9c2eff4a9ce02637a104515c6cbb553

    SHA512

    a48590bf3a815d87400098f7b0bd00ffd370c5e7671e8cdbab47fad7eca0111caa007871e66348f6ad62a06cc56b1f093ebabc4ca2f34b5b63ad0e4fe2e5557e

  • C:\Windows\SysWOW64\Cgfkmgnj.exe

    Filesize

    1.3MB

    MD5

    66ccd795b16152a43c04bc60982b211f

    SHA1

    725e1d33afc4d6c1899a684247e55f47a3265436

    SHA256

    33f64b87b5eb9cd3440135ab9720eb5c8a67fc2fd480b93e51fec91e283efb06

    SHA512

    d5ccc8e78eb7050b453b35e63c9ea1f3bca550a3ec5a6a54f332b63aef9b0e5c2c3931c728b6d436533c3e241be59240216720b6d01e6f22aea6ff2191564022

  • C:\Windows\SysWOW64\Cjakccop.exe

    Filesize

    1.3MB

    MD5

    f3c8575bfc6e3c8346c6667208d8d8fe

    SHA1

    1637f3aeab5bd2a16ee9e272f46f1575ac67af13

    SHA256

    d8f2393668c2e97b9b8bab7c1fdcae9fd7016dc19167b58c5db58d63fc93c704

    SHA512

    d22a463ef1df56fbc9e75d9e96e2426e6e1f337d82d0882f59ff07d201188831fb0081b6901b84da14d69c2db73487f2d4baa72f30c38cccd415f0d908e1f0eb

  • \Windows\SysWOW64\Bbmcibjp.exe

    Filesize

    1.3MB

    MD5

    dba4398eee5d508016d408ff36164e4e

    SHA1

    f88a5de806c16b8cd198eb5e378e3421d352b051

    SHA256

    4427b56a0794fb84cc1fe08599280f92b8f2cea2bb4bda9d33325dfdb09ecd77

    SHA512

    d69c00091fbe979b35529f4012731de05f5536d00f98565ba30ae7df60c80ad23ef58a7c3098489922a935af2a2be6e5b9e342d0c06853a885ecb8381e09a983

  • \Windows\SysWOW64\Bmpkqklh.exe

    Filesize

    1.3MB

    MD5

    8ba7b7df441b1a2a1304e03e1d9575e9

    SHA1

    2fa84a6c7636b2417e63c464c484045b02fb4297

    SHA256

    e556a03ce26cb2e961f0361e81ab525fe91d29ab7ea4d1899d655f93dd1a7a36

    SHA512

    ff8aa636fe4ee12b1dccc562687503b1f41dac3b82fff43cf22229decdc83dc90851a20a737ba9abd630d812b27c1e77aa72fb9a9c26f7b74ad2f014261d8212

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    1.3MB

    MD5

    40ac7d5c5cc33d5802126bfb65b7619c

    SHA1

    6bdfc76fa4edc828ccfce769e2628f0686229aa1

    SHA256

    bd762554080b5986b87ed51075ac0f3335cc31421f9b1e27fa82e6294b35421e

    SHA512

    747c30c36fc2a2db6b37ca3130cc720fdbb4f9a428b94d389e540d1d6e8eaf058fedbf54b5c9c12033b3b4b4502d6fa615be3b2f14fe7d3d435059dd5546ccda

  • memory/1624-11-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/1624-12-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/1624-109-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1624-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1692-27-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1692-22-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1692-110-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1692-14-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2468-72-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2468-113-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2468-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2524-111-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2524-47-0x0000000000300000-0x0000000000335000-memory.dmp

    Filesize

    212KB

  • memory/2524-46-0x0000000000300000-0x0000000000335000-memory.dmp

    Filesize

    212KB

  • memory/2524-29-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2660-48-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2660-112-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2660-58-0x00000000002E0000-0x0000000000315000-memory.dmp

    Filesize

    212KB

  • memory/2772-101-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2772-116-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2916-99-0x00000000005D0000-0x0000000000605000-memory.dmp

    Filesize

    212KB

  • memory/2916-88-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2916-100-0x00000000005D0000-0x0000000000605000-memory.dmp

    Filesize

    212KB

  • memory/2916-115-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2984-87-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/2984-86-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/2984-73-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2984-114-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB