Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 08:12

General

  • Target

    d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe

  • Size

    160KB

  • MD5

    ebf171354d090a36a19c53591b7a6d50

  • SHA1

    3e5abd63a5cb2abe8de76fdb7c8748b726492df1

  • SHA256

    d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990

  • SHA512

    c85027a412efd298356fedece0d1bf008eacfc18f31574848133b2b32796e578ebdef2cedf0ae96f628ff2f27874b8c6f77a3aeb0dddd0363b6177f630bddcf6

  • SSDEEP

    3072:tjB04DabQyklgAxD8gb3a3+X13XRzrgHq/Wp+YmKfxgQdxvr:JB0s8M957aOl3BzrUmKyIxT

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe
    "C:\Users\Admin\AppData\Local\Temp\d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\Ckiigmcd.exe
      C:\Windows\system32\Ckiigmcd.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\Cacacg32.exe
        C:\Windows\system32\Cacacg32.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 140
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Cacacg32.exe

    Filesize

    160KB

    MD5

    826b851af7943b425a5b731e2b5cc46e

    SHA1

    90076c785382113693f3906b7d2d72a6882aa966

    SHA256

    43c07277ca56e30f44e0e74e487571419b8ac7379e15c6470879fe5d3fb0df7f

    SHA512

    b759735f3e41eb16b4324786ca6775c62f23b2b0ae1924721f97c2cee3935ebec03d70fb49ae366daa45d632e5c11319c9133cebe5241113ee3780f35aa9abd5

  • \Windows\SysWOW64\Ckiigmcd.exe

    Filesize

    160KB

    MD5

    3d9c424cb4fd38d81040b47ced510469

    SHA1

    ba6956898c74b8afe33e41c68bde021527455b9e

    SHA256

    010c25e370570c55c0b152cba9a4803055af6081ee01cc2d250a98521777b3e2

    SHA512

    69a5e106545d27f8efdaae6130a21034ced2cee35d02a88e2393861eb9f6c8e1b6c520437f5bb2567db04901e17e7e9f1caf6ac6b2183c05a2534ce7140574c3

  • memory/2712-19-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2824-0-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2824-6-0x0000000000450000-0x0000000000493000-memory.dmp

    Filesize

    268KB

  • memory/2824-12-0x0000000000450000-0x0000000000493000-memory.dmp

    Filesize

    268KB

  • memory/2824-32-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2916-27-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2916-33-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB