Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 05:56

General

  • Target

    3bfc624d62372d7504d68cba950175e84bf2b33a5ca4ecde5ce653b02fd5e538N.exe

  • Size

    477KB

  • MD5

    078322411e766bf6b3965c0f640b4930

  • SHA1

    318d832e55e3a51f9177e5ac5665dbafea3c5e1a

  • SHA256

    3bfc624d62372d7504d68cba950175e84bf2b33a5ca4ecde5ce653b02fd5e538

  • SHA512

    09d2ee79a69b80492f4396011277622a0fe9d925a6c2cd73e86556d26f2f9436874c0c099f1b0b014c2c30e6e167984cff2401a92b4ac6ca3dbc93565e32d639

  • SSDEEP

    6144:nxMDZ0g6on/TNId/1fon/T9P7GSon/TNId/1fon/T2oI0YokOsfY7Uony:xMt0eNIVyeNIVy2oIvPKO

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 5 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bfc624d62372d7504d68cba950175e84bf2b33a5ca4ecde5ce653b02fd5e538N.exe
    "C:\Users\Admin\AppData\Local\Temp\3bfc624d62372d7504d68cba950175e84bf2b33a5ca4ecde5ce653b02fd5e538N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\Dpapaj32.exe
      C:\Windows\system32\Dpapaj32.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    477KB

    MD5

    a65981d95adf7580f63be3009cf331f6

    SHA1

    65f6f765c5fe2fba8a06595e2690cc1720f03592

    SHA256

    1ba3863fa2d24c03d356bd195094dc3c4f453b676aea76efb9f86bbb1ef3f8f1

    SHA512

    84b69a250d92ee6159396260e12f97871eb2cc35336adc65fdf303b2c3cc879a7053d01df44e9112ddb2fd80f2cbba29d839565b5d8ab014db1c940e4bbae8ec

  • memory/1980-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1980-12-0x00000000003A0000-0x00000000003D3000-memory.dmp

    Filesize

    204KB

  • memory/1980-11-0x00000000003A0000-0x00000000003D3000-memory.dmp

    Filesize

    204KB

  • memory/1980-23-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2360-14-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2360-24-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB