Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 06:26

General

  • Target

    7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe

  • Size

    88KB

  • MD5

    50c8df282b1d281f592e9d691b258f20

  • SHA1

    f482e700ca1b86225f6f452db09f55cd2e894490

  • SHA256

    7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866d

  • SHA512

    8e4664ef5d7bd536c6394045c11b48e3154e3c0f08082f8a8106438811ae8c11e0649a97908f89d61a0236b44168faa9c132d81b1235311dbc49bae7e96790e0

  • SSDEEP

    1536:EKJbOs1Oq1OYqfWvuSwOfrzQ7EcgxQ7YnCuILv13nouy8L:BOs1u1xvRLNXoutL

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe
    "C:\Users\Admin\AppData\Local\Temp\7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Windows\SysWOW64\Daconoae.exe
      C:\Windows\system32\Daconoae.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\Ddakjkqi.exe
        C:\Windows\system32\Ddakjkqi.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\Dfpgffpm.exe
          C:\Windows\system32\Dfpgffpm.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3096
          • C:\Windows\SysWOW64\Dmjocp32.exe
            C:\Windows\system32\Dmjocp32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\SysWOW64\Daekdooc.exe
              C:\Windows\system32\Daekdooc.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1576
              • C:\Windows\SysWOW64\Dhocqigp.exe
                C:\Windows\system32\Dhocqigp.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2828
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4476
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 416
                    9⤵
                    • Program crash
                    PID:1092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4476 -ip 4476
    1⤵
      PID:4760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      88KB

      MD5

      eb0d134312ef1077e51bbbbd57d98a25

      SHA1

      6b9a731594d636624fe19efa2d25410ae63c7f35

      SHA256

      c69633c4fa9c5aef7c54da9e9c791a92eeab4468240ebe076bc753c3845f7c69

      SHA512

      f2508307ce46230533768b1398472ec3120927d92506d203e2332ffba381a422846c269f6753879ef93371965c192c04e8a98acdc40cdd231c82fef13e4bd729

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      88KB

      MD5

      01ae0346195ba2c3f8dd3a2a0a7b9ed6

      SHA1

      ccc2e49b7683a3633a6925ec32ca235a1f9fa16b

      SHA256

      bdb8b7c8098fc6e6042e0f07a9e16ef4896ce7f8a22d7c0a640c7cad53e3ae0d

      SHA512

      ed240d4becc0f9641b0e5b289183bf13efd8da7ad73cc839d61cc63e08d7382af73a9dad607be27cb5b928e6c56113918a9cdc15d3a6ca00857ea9ed827899c9

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      88KB

      MD5

      a20be87e89e149db7afb3e1804a787ab

      SHA1

      49a695a67248b3b5500472e86acd5e0d34957b5f

      SHA256

      7b7069cc8af14af3024ab3f32509b6829184d97c87a3d4ba90250b5509c1cb0d

      SHA512

      0d67d8e5d2cb2f34167bc352717dfd0ddb988c0b920dc1cb5deee7aa62c671acb8a0e2653f12342d26e60ff11c03c3e41d38752701a8f65fbce8e2f59c3fdc07

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      88KB

      MD5

      328f6cd08d434d27c50da985d517c1a0

      SHA1

      75929f43cd00f8e77e59c7b54c92543e5b49ee04

      SHA256

      91a8f5e54d43ef5ba4dfc6f83efe5d408b46964947551cd1056627102a9545bf

      SHA512

      8828d8d2659f7e67499825359380fb3b93554adcb76bb48a1c3724e80dbbe77080ccedf8bafceb40b7cd80c64ea10ff7837c277cf5a6bc81fe08265d6df859ef

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      88KB

      MD5

      8dc9b385365a04f59c145e35acc4cccd

      SHA1

      0db606db32f782dc6ad8f36f8089557a47e988ba

      SHA256

      347baa36a96695e0376801d33799b6bb8b0f60eaf6b9d24b8e457f3b9eb22b5a

      SHA512

      fc586a181ac437d12d745ce15fca14e1e181dd132ff7e27b5aa59f1cb024f2bd33d5866d4cef6acd167061bb3ebda40e6c14ae120cefe0bbc522fb22feafa4c2

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      88KB

      MD5

      8dbb3635ed238899b51c04d2add408d6

      SHA1

      c00d2d23e9c02bade09379f58c51ab58781faea6

      SHA256

      2c570df465860dd89180cf4b32a258fd007ab7f709fd6c8b3daf36cdfbf49cd6

      SHA512

      b226f6ffb96aa3974d06787574832223732b7602b1a1d47044e64a86d305155f9cbf1770328bf7de4521171184357a20e67c4748f35d042cdebe8999d87b970e

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      88KB

      MD5

      279a344a8b8c89424b4196a0436fed11

      SHA1

      a828a328b0f19ecf82726a700b2814b54707c1a5

      SHA256

      1b34b31828fae043585ce6cb4ce19f87db8f67ac99a00905d428447ed85e06a2

      SHA512

      597b036ac1b9811146a6723de25e5cb3d24108d70bf24c015341e0bc2c96714de8e2825ff1ff4d09b915fba54c3cc6d0d97462aacf76a88c837c487552d97a82

    • C:\Windows\SysWOW64\Ohmoom32.dll

      Filesize

      7KB

      MD5

      88e75782878397c9ad3b7ff8481e6727

      SHA1

      73c4f3ae23d66661aef9dd5a39b4fd21c8df94cb

      SHA256

      846b5f436092fb38d7efbbfe05d350c978f804f70dd0be4e265b1a42ca3810f1

      SHA512

      2c23281e558b6fa3ee4e1babf96fc91c572ab76b28dbc7478054036d754db728d103b62be36d97abf63728be0a2d23a5b145a40ccf1c6dfa576ea1fee007d07e

    • memory/1064-68-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1064-15-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1576-63-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1576-39-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1888-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1888-70-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2232-64-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2232-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2828-59-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2828-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3096-66-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3096-23-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4192-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4192-72-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4476-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4476-60-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB