Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 21:38

General

  • Target

    d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe

  • Size

    337KB

  • MD5

    aa337d85ddd2339febb600d0782631f0

  • SHA1

    10b1750d4438f39731b06b146ab5c63b584b2bdb

  • SHA256

    d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56

  • SHA512

    bdd56130e1be4895230e7943733526754aa131add66745afbadad5e6fb3af5d0144947c41d042dc7704b7caefba60295c4693d03795db7d99cff64802b64ead7

  • SSDEEP

    3072:/7z4VO4qzvOHf1FXAgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:/7cVO4qjOHf1FXA1+fIyG5jZkCwi8r

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe
    "C:\Users\Admin\AppData\Local\Temp\d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\Cfjeckpj.exe
      C:\Windows\system32\Cfjeckpj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Windows\SysWOW64\Cdnelpod.exe
        C:\Windows\system32\Cdnelpod.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\SysWOW64\Cfmahknh.exe
          C:\Windows\system32\Cfmahknh.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3168
          • C:\Windows\SysWOW64\Ciknefmk.exe
            C:\Windows\system32\Ciknefmk.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2184
            • C:\Windows\SysWOW64\Dllffa32.exe
              C:\Windows\system32\Dllffa32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4104
              • C:\Windows\SysWOW64\Dbfoclai.exe
                C:\Windows\system32\Dbfoclai.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2728
                • C:\Windows\SysWOW64\Dipgpf32.exe
                  C:\Windows\system32\Dipgpf32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:860
                  • C:\Windows\SysWOW64\Dbhlikpf.exe
                    C:\Windows\system32\Dbhlikpf.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3620
                    • C:\Windows\SysWOW64\Dpllbp32.exe
                      C:\Windows\system32\Dpllbp32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:228
                      • C:\Windows\SysWOW64\Dbkhnk32.exe
                        C:\Windows\system32\Dbkhnk32.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1036
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 400
                          12⤵
                          • Program crash
                          PID:1548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1036 -ip 1036
    1⤵
      PID:2540
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4452,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:8
      1⤵
        PID:3132

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Cdnelpod.exe

        Filesize

        337KB

        MD5

        a8858a1f6735b3716b69c39f9a7bfc4a

        SHA1

        8f0964638e1696822d82adc71d2d0cf6e9bcdcdc

        SHA256

        2b6d4e79ce2c2959a7fe4988495466aa3350760f84c30c7e47622e66d89e0594

        SHA512

        5f11252bf3376b2303d93e33a2b03be3c04289c2512535c11cc140f195a2b42e295c103a1429c94be6540a5e6e8b9f6b348e8c361716a483c9935f960e31fc3c

      • C:\Windows\SysWOW64\Cfjeckpj.exe

        Filesize

        337KB

        MD5

        c6fc6dabdf65c974b79563789e76bc2a

        SHA1

        27c2fee1c94b814a381bca905058906a08b236c0

        SHA256

        c4d11a8d28155a607f1c7c35ba5e7d7bcbf23115a1ee132d1dfabab4a1729395

        SHA512

        7f98fb85b88c5b9603cdc176cb33a7e5988c825d5505527ff2b727c1404904286cb1482e01692ca056a607ab2dd03fd2d162662a102e129afd72754d573e4cb0

      • C:\Windows\SysWOW64\Cfmahknh.exe

        Filesize

        337KB

        MD5

        296c3cc6f5a7b0c3f55f2f87be60bece

        SHA1

        59aaef464f2883456b8c9122907ddc2f3fbddb79

        SHA256

        59b09b8a55547a214869d9ece3ded9e4fae14cf94ce0936b177db499700c4d31

        SHA512

        1a407d773384d1582c3f2625617c61d55389530ad30f876d917c2980d1365b1301031e1709021c9905aaaa1abf90844cff1c70ca4403c64af3d3def0a148f07b

      • C:\Windows\SysWOW64\Ciknefmk.exe

        Filesize

        337KB

        MD5

        cb36b5b1e7cc5756eebf66f532c5996f

        SHA1

        0834310123828ffb266acfb990c7d3d2bc155acf

        SHA256

        ada0fdd06006e3649a1df0cd8392892c0be79b576d1557240d273cb00e3fa736

        SHA512

        bcbba3dab4aa9ff2831e556f14b9b41870b9f481e76bbdc60376ce75b205d12957d27218e559d58e4710b9b1aed97c073da5b093f2002f9afcb9abdfca858e3a

      • C:\Windows\SysWOW64\Dbfoclai.exe

        Filesize

        337KB

        MD5

        1d9b43572019832b163cdfa2f69d1942

        SHA1

        026bd64e4f7c485d00f9351d13d2970e2d6f08f8

        SHA256

        1df795c71ca8aa4fb7ae187aa87dc966d2cdf6e2a4c6c5aaaefeff8ded682239

        SHA512

        8b1400f40f06f3e7715bbc4e8098e9fd517f0c5a253d1907efb01110bf9f56a54e2fbda1b86067d563f388eb8586d5b77e695b4b2e47c00dc1cec94f29c61cf9

      • C:\Windows\SysWOW64\Dbhlikpf.exe

        Filesize

        337KB

        MD5

        04afb9a8c88bd1b03953ae2eba3b69dc

        SHA1

        c2de3d11ff6337c2e0355be296b3ceca3db4fe30

        SHA256

        4c6c9ee8fd8bf8140117290132f7abd9254520727ad634b29fa22cc50a531205

        SHA512

        a258b76741c4d38244421f6148ba225d3cae9a29597424c74cf63acda4967c8eff3287d3c002e86fb068b549ef1949caa5b3660f20dd773e6956dac97d94f817

      • C:\Windows\SysWOW64\Dbkhnk32.exe

        Filesize

        337KB

        MD5

        490996e30d67fe3b3283b669cd0b2835

        SHA1

        79aa8e8471d05a593f2293620d869e8e9f5bec1f

        SHA256

        ede5f819ebb3e49d958958916039454aa8971af0a974b53c4ea3cc69a9f4b32d

        SHA512

        30ccf8ce73d179c164b92690f343016946ea27b0fd5595d8a8edf030fb514ccb31e7e68e6c98d327d0df081c19ff9f28e598bff2c2de868e9b11b8d3c8421d54

      • C:\Windows\SysWOW64\Dipgpf32.exe

        Filesize

        337KB

        MD5

        ab6edbd355d1297fcd4224ec54f7e4be

        SHA1

        bb37aee875c52786311ac877464e074b02385a41

        SHA256

        57712c29cf4d9351a74e55c46c657bc651814f9aac3d7b4d2bb7096d3bf6800b

        SHA512

        83f6ce57119e7ca8e27a10241ac3b8b994326c0aae906d5b527e56b5bb7e94e5f2ce7e0cf2258b1bfa78ed21f982dd33b8267ef68b88a51c59429437ed0182f4

      • C:\Windows\SysWOW64\Dllffa32.exe

        Filesize

        337KB

        MD5

        d77cfbd0682f75781ed565adfda9a655

        SHA1

        17d0519b110e64f1230fdcc5480385a68b1cc4e6

        SHA256

        5ccc3366d123ef36a38860fedf1629ca91a6d668a710e6f016e8b049d6c6d5d0

        SHA512

        f023f55bc516299f404242d81b8cef3038a27f4dff98cb9dc547530f823f23e21d76fa20ec07e9c1e19e2c9da0df2f3f8a7e75b3bb921cda98a75e2ea7081025

      • C:\Windows\SysWOW64\Dpllbp32.exe

        Filesize

        337KB

        MD5

        bad6f415764005ed0a8006812eeb354b

        SHA1

        5d463302aff51b39362dc91aa41d8d4f076718d8

        SHA256

        16736334ed26adad75fc3195261ff29e1204c0d2c27432b4463c2bdbc8bbd104

        SHA512

        fd237dfa69bca89163af3e176b88bfba0dd02a275bc0b6190718b78bd52272fa1023bdc37213e92d9a3f521ad54d8fbeb85cbf4089a76e7044a0077287f047bb

      • memory/228-85-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/228-72-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/672-9-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/672-101-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/804-16-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/804-99-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/860-89-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/860-56-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1036-83-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1036-80-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2184-33-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2184-95-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2680-1-0x0000000000431000-0x0000000000432000-memory.dmp

        Filesize

        4KB

      • memory/2680-103-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2680-0-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2728-48-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2728-91-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3168-97-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3168-25-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3620-87-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3620-65-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4104-93-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4104-40-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB