Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe
Resource
win10v2004-20241007-en
General
-
Target
a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe
-
Size
148KB
-
MD5
b71d9c898514c981d1b631582e7274ad
-
SHA1
f7cffd34b51fa72f94d2f243472e6448ec653429
-
SHA256
a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f
-
SHA512
f5d640ecb83990c34ea59c087c5813626800bbb3af0f53b00ca2ef34636da698d03ce4515cdf482e24ca1733c713483da01f3a915c48a31f25352ef86be6230c
-
SSDEEP
3072:USXFRj8IBsV+SVnY5OdzOdjKtlDoNQQ9wlHOdj+UCRQKOdj+U:US7vwnKOdzOdkOdezOd
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe -
Executes dropped EXE 3 IoCs
pid Process 980 Dhocqigp.exe 2200 Dknpmdfc.exe 4020 Dmllipeg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dhocqigp.exe a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe File created C:\Windows\SysWOW64\Elkadb32.dll a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 4020 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3108 wrote to memory of 980 3108 a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe 83 PID 3108 wrote to memory of 980 3108 a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe 83 PID 3108 wrote to memory of 980 3108 a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe 83 PID 980 wrote to memory of 2200 980 Dhocqigp.exe 85 PID 980 wrote to memory of 2200 980 Dhocqigp.exe 85 PID 980 wrote to memory of 2200 980 Dhocqigp.exe 85 PID 2200 wrote to memory of 4020 2200 Dknpmdfc.exe 86 PID 2200 wrote to memory of 4020 2200 Dknpmdfc.exe 86 PID 2200 wrote to memory of 4020 2200 Dknpmdfc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe"C:\Users\Admin\AppData\Local\Temp\a79e7f993e43a34ea719f086fbf689d1976c4bda22a173bf01a80a243ea59a3f.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 3965⤵
- Program crash
PID:4536
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4020 -ip 40201⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5c334343d7109a4a8c98f729f0c2a940b
SHA19113a4223c4e9a7453470c5fcd3915991cb866cb
SHA256d2f1b5df04581af801fd6339fbc49861b74a10fee66bbc78425f2a684314f03d
SHA5127dcd108b1501eae7c9d185bc359e560289c0b4aef1965435488d337fd1a2bbca45557816a5b378176158bdf9765791ff00fc2952a2108ce7e45cc8859e843752
-
Filesize
148KB
MD5e1aa990d0c3c2d49b754a83be5c0f302
SHA1dcdefe197405cf665548c1ca9f4f6ae842192f0d
SHA256841bc1d668d3b7afd44875b3d1e7c9771dcd926640fb239d5b9dca9ac8c97395
SHA51257aef30299ef625e59ec0c0a700ecaf47526e924736968ed46c1fb55d34c85ec2912106ae77fb3fee0613c30792c7df7a35f0c642286b6be5b1d386d3ddcf4ce
-
Filesize
148KB
MD5cf711d648779bb6d92fe312a7e964013
SHA1830a280459880dd3da86f3f6e633f47660762e82
SHA256d66de91c112c0279726b827766692525c05c758cfde8805020856ad5116063e1
SHA5123a2bf05963e9af5f963c81aeb0f7339e6ad2a0adfec44e0929af5e81070319ef6a10fcd259ee3663cc3f7479a8a6fd88f5cf9d55d039cd03d67f80cab46ae08c