Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 07:10

General

  • Target

    6347776f01aa38f6b48609f3b7f9caee81a9323be0a135f54bc8a2c7cb662807N.exe

  • Size

    56KB

  • MD5

    bfbfd46d5b27250d3a44f11fa39ba980

  • SHA1

    3780126e7d81a8faa22811ce91093722eecb1507

  • SHA256

    6347776f01aa38f6b48609f3b7f9caee81a9323be0a135f54bc8a2c7cb662807

  • SHA512

    e5b31fb574c99a526385ca39a0cdfefeaf0e526366fa6b89a009a4c8ed614896f80404039f343ad5878418485d4c091d63fa60eee78f70b7dbacaa7e9c1482e9

  • SSDEEP

    1536:TNkPKfEALS5OWmPgQ3PbPGyIZb1Z2gvLxff:+PKfEA/WmPxPj2Z2ALlf

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6347776f01aa38f6b48609f3b7f9caee81a9323be0a135f54bc8a2c7cb662807N.exe
    "C:\Users\Admin\AppData\Local\Temp\6347776f01aa38f6b48609f3b7f9caee81a9323be0a135f54bc8a2c7cb662807N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\Dfnjafap.exe
      C:\Windows\system32\Dfnjafap.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\SysWOW64\Dmgbnq32.exe
        C:\Windows\system32\Dmgbnq32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\SysWOW64\Deokon32.exe
          C:\Windows\system32\Deokon32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\SysWOW64\Dhmgki32.exe
            C:\Windows\system32\Dhmgki32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2008
            • C:\Windows\SysWOW64\Dfpgffpm.exe
              C:\Windows\system32\Dfpgffpm.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3864
              • C:\Windows\SysWOW64\Dmjocp32.exe
                C:\Windows\system32\Dmjocp32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4880
                • C:\Windows\SysWOW64\Deagdn32.exe
                  C:\Windows\system32\Deagdn32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:5048
                  • C:\Windows\SysWOW64\Dhocqigp.exe
                    C:\Windows\system32\Dhocqigp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1160
                    • C:\Windows\SysWOW64\Dknpmdfc.exe
                      C:\Windows\system32\Dknpmdfc.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4540
                      • C:\Windows\SysWOW64\Dmllipeg.exe
                        C:\Windows\system32\Dmllipeg.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:4744
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 404
                          12⤵
                          • Program crash
                          PID:548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4744 -ip 4744
    1⤵
      PID:2344

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Deagdn32.exe

      Filesize

      56KB

      MD5

      599739bc223e4321f2d20ead6f668555

      SHA1

      adb5599a76c4c2e3c4788ca5fe21b05700f8f744

      SHA256

      49b22252e97a1d28e43750d55b2a98cd9f38facfd6675d6e756b61ca9421cbfa

      SHA512

      331ec0647b071ffd4972d210ba3b7eea34ee6b5708b19790698406c7de1a727a5e80ff7d976ff4700b3b75e51c1d5acdf6eba525a7e1913d0421b06cbb282226

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      56KB

      MD5

      63194ce560abab0d0842b2013f5f60a3

      SHA1

      7c5ce651b7997ef4b9133a22511f374ede4dfc08

      SHA256

      c6dce8e81fbb45f156d8f1e3927e72f6397fcd3aa7f9e39738f55d59d3e0018f

      SHA512

      acbb2c0eb297205698471ca2db8f4125a2f9ebf69a64375bc811e661360853180d0380057143be5859e9acce9bceb5cc2f0086d254e6c3c750b16de97958470d

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      56KB

      MD5

      91f7af503f88aec81a02e456f9ee7183

      SHA1

      fc8474925da7dcdc435b11f5e661726605f3550e

      SHA256

      abe89267da586ed394e7a6c902ca0e975395d5d3528a8498e05af2710f0214e8

      SHA512

      2c422ed7fa7514cbbe688ecb0a2a6bd8b0adffd058667f3058f410f261552587ce7541205c6481e243b49cba6903d79b801da49afe655c94a9afc85c64936af4

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      56KB

      MD5

      1887e5168bb880b29507802534f31b55

      SHA1

      24c346129b45fdc1c820a372f46420fca9f37056

      SHA256

      9a55b78678846bec14b17ba24775b64442d0c5596d292f8d3dc3734edd19ab0c

      SHA512

      5c19023f1b66a6bc4ffdc2875b3a18322bd50937241ee89d0faa8529f3cb786548e0f6e1dd4899f244d9cfdee1966dd07f1c892da17bde931f0146df6967c8b2

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      56KB

      MD5

      b42c78af1bdfd4a274943fa0fe4ffcf9

      SHA1

      ed18c3811b86299747d2a386d8950fff62e706c5

      SHA256

      a8ab939449a872607c3aec89efaa0000f3716c6db3a9a2204fd71d912599721a

      SHA512

      b42f389cdac861f384a1b2bbcefce871f31e0fd4b1e51e2080ce40e9d0de384b41a6ae5c846719f7d5eccdf1e4b2cf6b9150b6fcf53efee888000ac5924401cb

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      56KB

      MD5

      558f8cdb2a976467fcdad48d2efe126f

      SHA1

      b7bafc483cdd5dc1a04a96826eff8c50da18224a

      SHA256

      ad628f9e3b1c5c96447385e1934dd68b3e34456039f5c007e0680785263fb701

      SHA512

      971b3751909b64ef9c627a3f6c9bf6775b3b0229c38b4c2436659658db82c0a353ab73572fd1d97012e185f2bae8a956d3634130cdb2818999c39423c418fa68

    • C:\Windows\SysWOW64\Dknpmdfc.exe

      Filesize

      56KB

      MD5

      423c38da9eb72b7ffefe0a4518620482

      SHA1

      baa50966e2c89187cd94edeffc668f533c512cdc

      SHA256

      aff2753646780da05746aa639d959ec8a11ed48ee467116078c09c5fdeb11f46

      SHA512

      aa5571fdb0bcea10482aee0f09939c28d2fcff231a642b73369c6069275aed3f42f7df9358c3415064a1159cc4be5da38cd45f55fd6509995377418feab744fd

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      56KB

      MD5

      9af472be75dcab9b03746528b55f77f3

      SHA1

      4dd7246508088ef148d63e250c6151f59c08f21d

      SHA256

      19cbfd51db4c486bd8bff96144e759ef74c05ff73552bf5579867229603e62e8

      SHA512

      eaa3bf018446fc9a9e4483f4a77eb2930ff2994faf5ec66fb981a040ebabf6f698833516ac44336f9b8dd4c3f2f9fbe9b4b4fcaec56a71c5c7f8a6d6448331ef

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      56KB

      MD5

      45df880c0bd8edac22c03866a2831529

      SHA1

      29ae7db5f8bdf77893423287a99d652c47168b20

      SHA256

      98959c165d41290eac37417f04d87f3a211cb4b67e8ee9494eb1b2626c4d6855

      SHA512

      38586179e84ee7ed5337162600158f45b2b90c0f3d960c2a583b79fc9696a4052caeee5940e81721affb600ed34c6c00e8bee930273bfe1f7045eadfb49221fd

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      56KB

      MD5

      c8b2d36eeae6fedb06662144690dd1e4

      SHA1

      49cba21ee229a1264c84931057250688425eb1b7

      SHA256

      41ef14168f0211d5a62ee4ff19d84ebbe2513f121ec5b48864fcb45eabe28a16

      SHA512

      1dc89bc3709db05033a15bcac33aef8b3ae0816f7cdd39940f8d62151ba5e7a26773874e73a4a697bcc71525d851e17ca87ff25e8093d6561b5baa66e9cb719a

    • memory/876-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/876-100-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1160-64-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1160-87-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-102-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1964-1-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/1964-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2008-94-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2008-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2708-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2708-98-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3864-93-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3864-40-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3888-25-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3888-96-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4540-85-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4540-72-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4744-80-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4744-83-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4880-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4880-91-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5048-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5048-89-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB