Analysis

  • max time kernel
    96s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 22:30

General

  • Target

    4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe

  • Size

    163KB

  • MD5

    a94484b11e74c7210deba0faeefcca80

  • SHA1

    2bfa863c22d7bccf49afd8bfc88ff6329716a3f7

  • SHA256

    4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600

  • SHA512

    5405d50e622d3acd528adefb051945043f04d43010da61617f51cc388220b903e8a373b76a6618f059854952ee5e89ae85c4ab8d8cae596781417da5eef49efc

  • SSDEEP

    1536:PiA1ynDouJMS8KUrp5PxC3IXlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:51qjJtU3ppXltOrWKDBr+yJb

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 15 IoCs
  • Drops file in System32 directory 45 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe
    "C:\Users\Admin\AppData\Local\Temp\4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\Cjpckf32.exe
      C:\Windows\system32\Cjpckf32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Windows\SysWOW64\Ceehho32.exe
        C:\Windows\system32\Ceehho32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\Cjbpaf32.exe
          C:\Windows\system32\Cjbpaf32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Windows\SysWOW64\Cegdnopg.exe
            C:\Windows\system32\Cegdnopg.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Windows\SysWOW64\Dfiafg32.exe
              C:\Windows\system32\Dfiafg32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4628
              • C:\Windows\SysWOW64\Danecp32.exe
                C:\Windows\system32\Danecp32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1284
                • C:\Windows\SysWOW64\Dhhnpjmh.exe
                  C:\Windows\system32\Dhhnpjmh.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3108
                  • C:\Windows\SysWOW64\Dobfld32.exe
                    C:\Windows\system32\Dobfld32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4720
                    • C:\Windows\SysWOW64\Ddonekbl.exe
                      C:\Windows\system32\Ddonekbl.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2068
                      • C:\Windows\SysWOW64\Dkifae32.exe
                        C:\Windows\system32\Dkifae32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1944
                        • C:\Windows\SysWOW64\Deokon32.exe
                          C:\Windows\system32\Deokon32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:5088
                          • C:\Windows\SysWOW64\Dfpgffpm.exe
                            C:\Windows\system32\Dfpgffpm.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4944
                            • C:\Windows\SysWOW64\Dmjocp32.exe
                              C:\Windows\system32\Dmjocp32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2092
                              • C:\Windows\SysWOW64\Dhocqigp.exe
                                C:\Windows\system32\Dhocqigp.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:768
                                • C:\Windows\SysWOW64\Dmllipeg.exe
                                  C:\Windows\system32\Dmllipeg.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1804
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 408
                                    17⤵
                                    • Program crash
                                    PID:4032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1804 -ip 1804
    1⤵
      PID:4152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ceehho32.exe

      Filesize

      163KB

      MD5

      38d8f77a078b5022629fee309805d313

      SHA1

      72096e9ac53c7cb0a4229c53223ac88272971ea2

      SHA256

      9a3b36b412939458b38709c89e728fd2ddac4de6caefc1a6d4e6fe9601561ec8

      SHA512

      5e67b4d4c75c4da142875e05e9b8e6f9fae30f8cdf29a28557cf75661206b5c19e1f6fe3c2c4cb3be17a853a5bf911ad2f68f6e3d0a6eca415f800e6461527b3

    • C:\Windows\SysWOW64\Cegdnopg.exe

      Filesize

      163KB

      MD5

      20173811081d3e50dd3c7db80f52eec4

      SHA1

      f317748af4a696c4576f047ede21e1b2e0b24c6c

      SHA256

      5ebb36e646c6a860fbf85343581cdcc907edb9cfa6833cb51403f9dc20a06427

      SHA512

      5b595248ff0db81389cc33b85ff3ecbb2cb29cf736957c93580df9481a15c514733143793c09b65b74b89b9a9b1443384876c0af6e9e4587e38290b95ea9c5e2

    • C:\Windows\SysWOW64\Cjbpaf32.exe

      Filesize

      163KB

      MD5

      59aa0d6546db96a8359333ea298e7918

      SHA1

      0bcae175468ef462855e64b3ace1ec8d1f92e702

      SHA256

      eb80ec9a1cd4b65c4ef02e6cb40a2b9d91e470df6fa75a01ea5d2652147d4bbf

      SHA512

      3a7c41f56cf827ce89232c8101cf701be7b4d72900fef55e33a9b97de7b9921761aa55cd9cdab262ea40d27eda92632abc03b4eed5550c00ebe7b3006067125b

    • C:\Windows\SysWOW64\Cjpckf32.exe

      Filesize

      163KB

      MD5

      bd69667c965f42e151e46d1c8a7e789d

      SHA1

      813dd03297caef599bfafc035f686bbe88207345

      SHA256

      496c78d092ca6d61d1997f57d6102f5ef8e050cb331a676f78bab2931beec78b

      SHA512

      a9bb4890e1c8e1dfae3d0a4f0dfdd8c9dc7322559a747d6ad2791de20e72f780e7ee9a627b7a5a8d4e779ee80b4f8b3934d61e10b6d420877d574368cbefd23b

    • C:\Windows\SysWOW64\Danecp32.exe

      Filesize

      163KB

      MD5

      1956e0b64cedf8b565daeb5d514476e1

      SHA1

      f1780d42a5f97195a0a058a9b12d5f221661ccda

      SHA256

      df1d982461f7d617ba67a0513bc37d51535ed05d1af689a85ca27156b2b9b35c

      SHA512

      63b27a947400fb5c58e668d436ded2f58c5c153e43f3952596e2d0ece41c354798ddbae688d7cd3d8c66eec001ad3f34e88acfe6934e3a18ef748d4c2d6cae34

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      163KB

      MD5

      854f39b3a7d252abe2ae2e4352eff896

      SHA1

      f2fe7793c100d214169d7c4eb03954783edfeaf4

      SHA256

      014839a13229312e0587a8d3596445fbf995a610146afad3ee16e9157b7e5b22

      SHA512

      521f6643270cc796c17d1c3dc656470c331cec2ea82d3a98080dfe2aa0d6fbfc84fc313df7b7f3acc75625d7169b70cea1ab512d52402f7860230fd38fe68532

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      128KB

      MD5

      20db973dcfafaa74d866b91eb005e6c6

      SHA1

      627f74c83ec1cd550cfb325aa47b211e3a242932

      SHA256

      6a482ef49f1bc984f80aa278cda781ca936f54b47c7263cea9d8b99369e0c57b

      SHA512

      827cb193fdb22b9d22b5fbde6b93a0ad43372affc94a742b728ef45609ae6bdabc5939d10781a90ae72605e086d895a21df778e6ee02a0f98f328a28f0e43f22

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      163KB

      MD5

      a8f9e1c701551c7e18dc9984d77cd825

      SHA1

      ec57d48eb93cc3c19bc9e01d16f1a9bc3b6ac5aa

      SHA256

      51d5445318b06b6e56a723218e0fee79951de0a67f5951c4a56dd897fa9b58ac

      SHA512

      8bb80d380540eea096c3b9566fff2a68e84c7afe02448f1cdded06c40f47639e118864035e862634a4c7b7d91e4e574edcbbc328bd166feb9d378748ae37ac8e

    • C:\Windows\SysWOW64\Dfiafg32.exe

      Filesize

      163KB

      MD5

      3a965e78cf7ff47d8d7d09e38762e50c

      SHA1

      69ce20e8324ba06550babfafa738320bbae5e4f5

      SHA256

      2dd47ec24358bf1410fbe9ddd232e0db401bb5de044db1dfe3bd6ef61cece1b4

      SHA512

      03f88b62e1d39e5de175faacee3847f4b1e3efeb7f14a4a1a98ea887db99c8e081277de4065e3ff3bf882418c56ab9bca710fdf050b0eb20f01b1d625d55b225

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      163KB

      MD5

      ae17dbd31ea8d1c189bccc3f3cfa94ed

      SHA1

      19a04bd5d19a5544a38c5db57c5631f825d58a94

      SHA256

      0e49da280f91f259334181137d854a57c795d9d87fc339742c7e6084f99c5576

      SHA512

      8ca03aca4112f06329ecb3da359d849ce245a5177ca93c27cc3c25e2037568bdfd42bb91f1458a38a10a8eb360e548ec18bc85b0eab9aa7e35cdf4e605624ef4

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      163KB

      MD5

      d3cb455a370982fd3a5c3be97607817e

      SHA1

      7267fce644f4ff7ec2d81880ced86d22f33a9ed8

      SHA256

      ef69ece69b2d5defecb8139ad469703e570507d5467113c8b21e2eab13873dbf

      SHA512

      651819482620aa73788c02868347a5292f155fac0b171836b018d28ff1c24de977436baa1f9f2ce2d552df13446892c40e65af7124a6f36a71fb391e6ad38df9

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      163KB

      MD5

      3cf594d91fa555cbb73e9dd2a34caa94

      SHA1

      828a815f47a3ba7458e134a19ef6537476e94aaa

      SHA256

      a360db7bcc8d314e1277f1129d78077e7cbddd13d7096c4d03e7e2ff82a4b7e2

      SHA512

      7595f91eaae92bd210eb8f4823c190ef6dfc9801f169b86e9ae29900eb6fa31cc0dd9e3fbe5a6fd6207f51c6057a50b1e8fecb45eb92ea8095affce0c4a8d0aa

    • C:\Windows\SysWOW64\Dkifae32.exe

      Filesize

      163KB

      MD5

      5b960fbc88dd28319dd90bef0b9da4ed

      SHA1

      d7094b88227ef60b893efff34f1bf7ffe29c8397

      SHA256

      ab5681a07d2526fae8025b186e014fbe6c2c75ea14346fd0c6d2e39a810a46fa

      SHA512

      2967142e12ad96ff6401a1837927961acf89d1196fcba77bdafc92466ff7f0b43abb3d732d739cbe787f052a914bacccfa3572bc1ae28db279ce4addffbac432

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      163KB

      MD5

      bd2f943eb59e4eb203972580fead2c26

      SHA1

      7ae59aa8629dfd5bcf32e1b34e66b1eb4df9aba3

      SHA256

      3019e5ed81e65f76522feec0c62fbeecb4446850ad45d723738e64c553aa9325

      SHA512

      66dec897836ce6f5ae7740a4fa3e8f1b320640f1295d58217f78bc8ba38b999b97cd744316512f114e7afc34c0da6782ccb0648979aeec5d3e1b10a17c8ae87a

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      163KB

      MD5

      04c328efe0c2d1c0a8bff2c82bcb957f

      SHA1

      cd6ac540e1146f8b489f78c6dbf8286dd39cf1d2

      SHA256

      e676fc36e45f023c6977b9865e60fb1b93043a2be7a5b813551e1e65b0eddfbf

      SHA512

      7c2a89e58afc594ee19838f4125770990542dc5715bd5cf98fe3a1880144473591e604706d72deab4709cf77ac3b7505c867eeedb0db30ce88c3224d66fc52b0

    • C:\Windows\SysWOW64\Dobfld32.exe

      Filesize

      163KB

      MD5

      a646fde41f4bcc07b3b6fd93637ccc48

      SHA1

      75ade8b191a97968a0859d6b6365d7edb3afca25

      SHA256

      145ae0cc07148bc0af34139dfa6dbf518b3ec2627301f245c2c7ea3139dedc0d

      SHA512

      b96dd1b74e9ab65d0be945d41c0303d2b5f59cacd57e5a15cf8f0e7cbc7fa81f08e688fef96c38ca139f15c7db786edca9a289aa4cdb779e96796e8bb3502c4c

    • memory/552-148-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/552-17-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/620-152-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/620-0-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/620-1-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/768-112-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/768-125-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1284-140-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1284-48-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1804-124-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1804-121-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1944-132-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/1944-81-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/2068-134-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/2068-73-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/2092-128-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/2092-104-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/3108-138-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/3108-56-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/3492-8-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/3492-150-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4420-32-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4420-144-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4628-142-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4628-40-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4720-136-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4720-64-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4904-146-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4904-24-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4944-129-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/4944-97-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/5088-88-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB

    • memory/5088-153-0x0000000000400000-0x0000000000453000-memory.dmp

      Filesize

      332KB