Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    32s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 07:07

General

  • Target

    5973f8a6d5c1b5ed7e7f88c41f929285ecac02a29321de7a8de2cefed36d99d3N.exe

  • Size

    85KB

  • MD5

    b514dbe905ea455ff0f5e1da5e5420c0

  • SHA1

    39b08c11445dc38d2726f7378a25c35c723537be

  • SHA256

    5973f8a6d5c1b5ed7e7f88c41f929285ecac02a29321de7a8de2cefed36d99d3

  • SHA512

    f3525d871b9c757e71d8816f00ae79fca8ce85a0b0b4de172c07430371b6bf2e2e680c71812356587b5d9cf581346dc9df09bf712b7f12bdd6580402aea74470

  • SSDEEP

    1536:8nhJy/vUEc9uXsfqHXtZel4EC94e2LHaVMQ262AjCsQ2PCZZrqOlNfVSLUK+:8nhk/vVgQsfqHXt4tCijHaVMQH2qC7Z5

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5973f8a6d5c1b5ed7e7f88c41f929285ecac02a29321de7a8de2cefed36d99d3N.exe
    "C:\Users\Admin\AppData\Local\Temp\5973f8a6d5c1b5ed7e7f88c41f929285ecac02a29321de7a8de2cefed36d99d3N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\Ejmebq32.exe
      C:\Windows\system32\Ejmebq32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\Emkaol32.exe
        C:\Windows\system32\Emkaol32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\Eqgnokip.exe
          C:\Windows\system32\Eqgnokip.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\Eibbcm32.exe
            C:\Windows\system32\Eibbcm32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\Echfaf32.exe
              C:\Windows\system32\Echfaf32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\SysWOW64\Effcma32.exe
                C:\Windows\system32\Effcma32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1692
                • C:\Windows\SysWOW64\Fkckeh32.exe
                  C:\Windows\system32\Fkckeh32.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1504
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 140
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Eibbcm32.exe

    Filesize

    85KB

    MD5

    820180fba128c013f271e808949c8598

    SHA1

    7d477b8369c81ac3c49e4d21d3b02758980a4a38

    SHA256

    cf6d1e9c39820d2d13dc6bb7f9e8239e2c407131840fe6b5116748c7571379c1

    SHA512

    113a80ba0b76be697ff6cd5a6287d6d524abfb7479161e31fec1abba0b581d7da50324741dbe0ea0fe36b6be76e43ef8521a224711cb07bd31dd2d2564773f81

  • C:\Windows\SysWOW64\Emkaol32.exe

    Filesize

    85KB

    MD5

    802f1fe975b2397045ab44faad453a7c

    SHA1

    3e8a561b9f5c340e1d43a04f61eff52993fff6b2

    SHA256

    dc47a95384d0432e5404e0acbb98a1faf5c6462865cffd086a8f929dcb6c960a

    SHA512

    0e3bcc144035bf42cf002ec1a83df7e398d6ddca7efd9eb712687c87ebbbbf87593cbb87485d6c557c9118d99db56f70fbdf15e0b898bef86fe9e4170433cd16

  • \Windows\SysWOW64\Echfaf32.exe

    Filesize

    85KB

    MD5

    ef306a24f44303e578fd932df19502ac

    SHA1

    764585c78571a6b51e63c1bacada16edb53c8f40

    SHA256

    26d465c4a56917b4a68ad11159f4affe4c9515caa034f8eabaa6aa16af8b3d6a

    SHA512

    10b9c830fed7a53ef7862ace91500455d7518cd9c82a0b32c071dda8b20abb5e65387f069ce8f438d42a6964d0d68e2898d64126c9a78924ba4d18f018946cdb

  • \Windows\SysWOW64\Effcma32.exe

    Filesize

    85KB

    MD5

    36e355095e8f72e395fb4b4649d829e0

    SHA1

    45a4a556548160f3d124a98424d40f7a686a98e8

    SHA256

    04714f08a052cd47fe80d53c707847659b4bd3df7c9b92e7f59503f293da78f7

    SHA512

    d17b7c1de5fc492ad72af5ceb7b76ffd05a66537e0dc9274cdea5e8545c991ce66d0650ca33b602c4128c863f58248d9f7e45010883d1fa09e4b0caef0c59c56

  • \Windows\SysWOW64\Ejmebq32.exe

    Filesize

    85KB

    MD5

    19cbaf3d75af84a3c9d189ed6e42ed30

    SHA1

    286ce8ed9dcff81e20c0e5234a147e8a2b99316c

    SHA256

    d4fe4b01dccae58f7289b109244a98f104f56c76dc74e1ac287e826a08fdef6d

    SHA512

    fbb34f16cd56bc3ce983a2599969fe09dd9288469dd793fa41c00bcfd20418129dde5d9cf6372926bdda98d0f4124343468e82cd35cd7c8f3c65f4d03070b1a0

  • \Windows\SysWOW64\Eqgnokip.exe

    Filesize

    85KB

    MD5

    0f398a22bdb251787e3919cc1abc01b7

    SHA1

    70de57c5bd533e1742fb165472020242a699fd42

    SHA256

    fc3480e849d56e28c82ccc1f5cba4ddc27f7e6f3f5b148584eab7dead3e7a285

    SHA512

    67ea33db8512e6cd57f71ef583ff9b7dca84a00d27f277cf6d1b10c10d8a7461280fca87a7c3064c1bd695623842370e945b52674be7dedebac2d12445d0a831

  • \Windows\SysWOW64\Fkckeh32.exe

    Filesize

    85KB

    MD5

    c7848d5c1f56aba559f5ef0060b91db2

    SHA1

    b5f391d10f75faf9fd5b75677e254ebde8a12072

    SHA256

    0d2c891f28baa951ac87031c19759cd999311778995b2d203fd6f5eaa92aa728

    SHA512

    548eaf5b1384845dc67b72be3dd6919ec73e524a4283eca859ce63908a1ac64e4551956efb82a8ea2a60efc275911155b241b9d70c02fdd05638e26e281cca8c

  • memory/1504-108-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1692-95-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/1692-109-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1692-85-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2220-12-0x0000000000280000-0x00000000002C1000-memory.dmp

    Filesize

    260KB

  • memory/2220-54-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2220-7-0x0000000000280000-0x00000000002C1000-memory.dmp

    Filesize

    260KB

  • memory/2220-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2616-70-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2616-107-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2616-82-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/2660-25-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2660-68-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2668-52-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2668-94-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2704-83-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2704-92-0x0000000000250000-0x0000000000291000-memory.dmp

    Filesize

    260KB

  • memory/2704-27-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2704-35-0x0000000000250000-0x0000000000291000-memory.dmp

    Filesize

    260KB

  • memory/2720-55-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2720-105-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2720-106-0x0000000000250000-0x0000000000291000-memory.dmp

    Filesize

    260KB

  • memory/2720-67-0x0000000000250000-0x0000000000291000-memory.dmp

    Filesize

    260KB