Analysis
-
max time kernel
73s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe
Resource
win10v2004-20241007-en
General
-
Target
ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe
-
Size
55KB
-
MD5
f5492aeac001e80bd0429c4f5f591e40
-
SHA1
3421f0f8032f9809452704fd4ef85d4eddbaa8dc
-
SHA256
ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103
-
SHA512
85d9bb62ab74fe702eb1d4feea31bad48cb9e48cd148b2cbb8dc822477f12faccf96739cab3dee5cd8ba515c110fc2895937e9aeaa2e6f27a76078f8eaacc356
-
SSDEEP
768:LPOhBHsQRzrtG0Qpc6kDgSSSFjmneYq03bEYATBfcTLT2p/1H5RXdnh:LPOvVg0QpnkYQeYcD2Lp
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danpemej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danpemej.exe -
Executes dropped EXE 2 IoCs
pid Process 2848 Danpemej.exe 1040 Dpapaj32.exe -
Loads dropped DLL 7 IoCs
pid Process 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 2848 Danpemej.exe 2848 Danpemej.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\Danpemej.exe ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe File opened for modification C:\Windows\SysWOW64\Danpemej.exe ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe File created C:\Windows\SysWOW64\Cbehjc32.dll ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Danpemej.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2920 1040 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danpemej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbehjc32.dll" ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danpemej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danpemej.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2848 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 31 PID 2688 wrote to memory of 2848 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 31 PID 2688 wrote to memory of 2848 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 31 PID 2688 wrote to memory of 2848 2688 ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe 31 PID 2848 wrote to memory of 1040 2848 Danpemej.exe 32 PID 2848 wrote to memory of 1040 2848 Danpemej.exe 32 PID 2848 wrote to memory of 1040 2848 Danpemej.exe 32 PID 2848 wrote to memory of 1040 2848 Danpemej.exe 32 PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe 33 PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe 33 PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe 33 PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe"C:\Users\Admin\AppData\Local\Temp\ff8f7f05aaa397faee7b97ab8da2eaca798ce48e1ee29bd7db015b3158a33103N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Danpemej.exeC:\Windows\system32\Danpemej.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 1444⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5d94eaf38b4b668da2b65749a25c20d38
SHA16a03c93c575f4428421ed478a8831398362970ce
SHA256e062574674ba7f3a2a942b8a5182b7cf57636d73a65e7ac14eb7785f01694599
SHA51207fec92fca1ff51027853866a3c0ed7469d0db5b45ca23b54e9adc0b325f0b6701c6c8b5d77790ede44da088a72c679b5f289d6ebb6253105b3acd33b1d0d3ea
-
Filesize
55KB
MD5e714a848342863a3ad36556c19e16827
SHA16aa5f7b6fe9f897c81ccced8cdbae598b4337462
SHA2565bc2f934cd5d428f2306bc43d8598abb1ccec28a2853af0a89c8cdaf96607e5a
SHA51273e70c26d256971219068488605dcd7c6c8466f2564a740ac1265d1fc1416867deabe52eca8c03fea96bbae66539f85f2caece6f7e0ad4dbc785986b84ec5408