Analysis

  • max time kernel
    80s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 18:47

General

  • Target

    9aa8cd9832d4df2112ab821b4265ebef836e3e3b51e7cf3ec1130d4b716ccd42N.exe

  • Size

    347KB

  • MD5

    8a4386dc5aaf8c91c98e57ab58c57ab0

  • SHA1

    fc87b894e5c62bb41f098d5aa07826a3eb315627

  • SHA256

    9aa8cd9832d4df2112ab821b4265ebef836e3e3b51e7cf3ec1130d4b716ccd42

  • SHA512

    71a6c44de8369aa30750039fe29125e4ff38a682e97d6578f73515afab5b38d3eceaa3e0caf081a2f09e37bf55420229801fbf478a31247d761240d394ab8923

  • SSDEEP

    6144:wvX51zqth7G5vx4brq2Ah1FM6234lKm3mo8Yvi4KsLTFM6234lKm3qk9:wv51zGh7Ax4brRGFB24lwR45FB24lEk

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aa8cd9832d4df2112ab821b4265ebef836e3e3b51e7cf3ec1130d4b716ccd42N.exe
    "C:\Users\Admin\AppData\Local\Temp\9aa8cd9832d4df2112ab821b4265ebef836e3e3b51e7cf3ec1130d4b716ccd42N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\Oegdcj32.exe
      C:\Windows\system32\Oegdcj32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\SysWOW64\Opmhqc32.exe
        C:\Windows\system32\Opmhqc32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\Ockdmn32.exe
          C:\Windows\system32\Ockdmn32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 140
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Oegdcj32.exe

          Filesize

          347KB

          MD5

          f90dc082cba41da12db653882133aba1

          SHA1

          462bd81b2e7fddf5b5fe864818f2344168c464e3

          SHA256

          d4e26948eb0191cd8c88ed93f74738c89e1061158dac56c884f9ff78ec9a5e49

          SHA512

          51818dc75b2f494d1e2ea6f7f269bcdc392be15c8b11b173fbaf39aa52dcd5f5f8394ffb95b5b83dd14de9c26b7d4d848b57c867e1eb9f16e5af0fbe4706395c

        • C:\Windows\SysWOW64\Opmhqc32.exe

          Filesize

          347KB

          MD5

          ce5a0c4c3c5a5a1f8bc9af8839394d9e

          SHA1

          9265f6722bc7b1350ffa6d3b6ead5254c3e6d8fd

          SHA256

          eb4040c969c24d3b0fe19ee6dc09ce2e8e5ca03061b11efcec89d3b58183322e

          SHA512

          d493b5d3f371c166a9c81951abe8cd641a0fc1099781970471eae923b574cf084667bd1842b3e7055527719320668182b3d1e181e2b29e48fc474d732e77bddf

        • \Windows\SysWOW64\Ockdmn32.exe

          Filesize

          347KB

          MD5

          145bea12e42d168b39f6dd9f83d357b4

          SHA1

          794e616f33d4d415c12572ff9761234212f50a04

          SHA256

          7b1920adcb48cd857b7a44136329153364feb83e245668dd2ca4da5afb7a576e

          SHA512

          f09b538268cfe01bd05d16f75cb2ea19b9fe309df24d9c68137b28ba47154d9b41a06421f89592d52dffe9df212037d2771414cb570066c3950acde0d4a08143

        • memory/1760-14-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1760-47-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2192-32-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2192-40-0x0000000000250000-0x0000000000293000-memory.dmp

          Filesize

          268KB

        • memory/2296-11-0x0000000000460000-0x00000000004A3000-memory.dmp

          Filesize

          268KB

        • memory/2296-0-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2296-12-0x0000000000460000-0x00000000004A3000-memory.dmp

          Filesize

          268KB

        • memory/2296-46-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2964-41-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2964-48-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB