Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 08:26

General

  • Target

    c8da14606955463bb339039365c38c9c1c9ab0a08824b255a89f0925f8f0d333N.exe

  • Size

    55KB

  • MD5

    aac1933d5acae4ffe32749b30f7d6230

  • SHA1

    dadd8b0c9b7678d0c19d68acbcb86aa80dd5f318

  • SHA256

    c8da14606955463bb339039365c38c9c1c9ab0a08824b255a89f0925f8f0d333

  • SHA512

    7ffdc76b50d8390833e7fb9bb5f0c8061f9687682e06712ebbc2cfdb946de9388e322b98f97eb70886a826fd0ff1d7f51fe4aeb20c735e6802ded9db0201c19c

  • SSDEEP

    768:kYEei+rghd7VdhD0dij8pBmEvaJPYfcTS+8haWBrwB6C2p/1H5AJXdnh:S8m1wdigpBmEGicTl8fBrwBF2Ler

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8da14606955463bb339039365c38c9c1c9ab0a08824b255a89f0925f8f0d333N.exe
    "C:\Users\Admin\AppData\Local\Temp\c8da14606955463bb339039365c38c9c1c9ab0a08824b255a89f0925f8f0d333N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\SysWOW64\Dhkjej32.exe
      C:\Windows\system32\Dhkjej32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Windows\SysWOW64\Dodbbdbb.exe
        C:\Windows\system32\Dodbbdbb.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\SysWOW64\Daconoae.exe
          C:\Windows\system32\Daconoae.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4804
          • C:\Windows\SysWOW64\Dhmgki32.exe
            C:\Windows\system32\Dhmgki32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4760
            • C:\Windows\SysWOW64\Dogogcpo.exe
              C:\Windows\system32\Dogogcpo.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1188
              • C:\Windows\SysWOW64\Daekdooc.exe
                C:\Windows\system32\Daekdooc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:792
                • C:\Windows\SysWOW64\Dddhpjof.exe
                  C:\Windows\system32\Dddhpjof.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1880
                  • C:\Windows\SysWOW64\Dgbdlf32.exe
                    C:\Windows\system32\Dgbdlf32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3048
                    • C:\Windows\SysWOW64\Doilmc32.exe
                      C:\Windows\system32\Doilmc32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3248
                      • C:\Windows\SysWOW64\Dmllipeg.exe
                        C:\Windows\system32\Dmllipeg.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:764
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 404
                          12⤵
                          • Program crash
                          PID:1944
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 764 -ip 764
    1⤵
      PID:1892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      55KB

      MD5

      a67f70cb7dcf28b42412f5a6477b23e3

      SHA1

      7b5ea12f68c42b679d505eeb14c7b788a207ec4b

      SHA256

      1c243a7d692ba5d3d86bdb31e2c5d91d8cf6dff6bea6f7a50ebb8fe06e5c7777

      SHA512

      7f4e8cb3aa863c01088a14f829de745183e1a9d428ca5427a928c90e471f9dbce9028413cba62b011bc3117b73c9af16830233053998bdb34093048d67fe54ca

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      55KB

      MD5

      bc77064e340e6eaf746747b660d1e21d

      SHA1

      6b467fd5d704e19516b0598c98a80ea2d6fa81e3

      SHA256

      2eef6a131e3d4d011708bac44129c7a8ebbeb7547aa99996087d2a6bcd657a1c

      SHA512

      c8b5dcb3b40f5efdf2768cf910ad4641e201f22500aa365c932541c311c121d431c021efccf9e7de07f3f6a7e9c2a7d8d0010367d75b3b7eb914887b7cf238ac

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      55KB

      MD5

      d5ff09265bbccb05b00193a7a2e376b1

      SHA1

      305aa36fd94d22612df6a2f366574898d75d3e1c

      SHA256

      a3f564dde15a49c8964986d155f29fd83f0fb996a845a86f9b86294c274acfc7

      SHA512

      cc90f2607a5fad4d6ce4fc913406e1363ec3aa3a0e1d9a4b95e9de8f9fdb30f2fac05044fb8300c2b5bdd50e1fe88d0d57066412f0485abe1f1cb3551e481835

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      55KB

      MD5

      ad4f0bdef7075c6d1c31dc979bdf2275

      SHA1

      f2af5cf95efabb57e8cdc9829e32c05bb3e6cb2d

      SHA256

      9263f23b8fd584ea365356420f9a4740eae3ce864fbf879f3507f5065c503250

      SHA512

      e71065065f7d04374b1fa2bae7c74a65a33a0622daa9f9bd61f8406bd2fd1172cc8ec6fd8237fa21b8f65f465087419bac3ae06f5483557662634f919b6cf730

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      55KB

      MD5

      85a344b6da7f7ae0bbce803683e0f1cf

      SHA1

      cb2313259f2d598abcbb054e1f049d191eae4446

      SHA256

      fb75f6c342973dc37b7e14f9a9910a7d12cb4f87cf40d4576d7a6d92d95f7995

      SHA512

      9adca7f2026180a225b66c6b77dd1a293657054b393b5c8672bc2a0d27ee4ab8a9f2896842601dedb7b05d35fb8b289ab5dcf69643eb0bf90e015584c4b3acee

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      55KB

      MD5

      4040fecff7d0ab6b45eb27ae360a6a0d

      SHA1

      2f428e73678587adcdd08319a13638b68caa5a77

      SHA256

      5e54989d31e8edea6e39ea2b6b6043751c6b57d08bf1f29ce123d82efb547c68

      SHA512

      6a1ab04f1a63ff2732f42194d688a8408235afa4d20c2a9641541063315bda82a705aad61f802b9b4feebd9f9aaa5a510bba61a01ea07947be0d8fcc63e3e97f

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      55KB

      MD5

      c0c96c3926367661a3760b358d2b85d9

      SHA1

      df0ca87a8690d0eda6f870923459494a9ca6b452

      SHA256

      a62fbf018688fe9e714c54c24d2ceeb905dfd4229ffc37d5663adc795c88ba93

      SHA512

      25418467b8b22f39ee6d0dfa1158e01c0c12878658d0e8a5715d58d75c376db8d3a980a9eeefd61e61c9c052d521be80452afcb3113791e5fa4d2ff6411045ed

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      55KB

      MD5

      81c7d2a86b65de4d85e22b1a0f2e4af3

      SHA1

      977c062c9a53ecae6197a1dfbcf3ec61a4977fc5

      SHA256

      8e9ee0562b9a1b6a18bd88dce59ef8812d09f5e6a12151805d682ec43e98d85d

      SHA512

      06ad52dab998fc9e3ead1874bcf731a652b50a8538c81fe5d63331af24f59efc5ad3f2101313cf72754dee9927127b16cf129c18029694835c8a7903c0c0416a

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      55KB

      MD5

      4eadddfb07d867e00256e0e7338a8517

      SHA1

      9788f48e2d41a024bfb535e93fc17d2d6c9d1df5

      SHA256

      202b140d14703d6de44b8709b14f4b228bfafeb72a90e2d13193ade30edd2977

      SHA512

      97ff840dfd2dafacf510551cb435afb65f95e30781ec713dce2f1f25df4496dd2cb31a67d5c9b0bfb9b384627817075ee4f644ec4457f4d02812bcb88ed6c6a7

    • C:\Windows\SysWOW64\Doilmc32.exe

      Filesize

      55KB

      MD5

      0ece40d7c9d9c095a4232c2c0227d36a

      SHA1

      8919ac2f3deb26feac2706ed4c6d502e8e9ffe66

      SHA256

      68f3f235222d902433ff17fabd10035544c1e843feb7c236883e93f93f4bc247

      SHA512

      b75f65d5d695c3e527da03bb961b6dc1e9ef39f8ad3c51d6f47fbcf41270d0c35425d24c206b27023e9e689d793bc05e5704fdda568444e1243a04d6bff43c4b

    • memory/764-84-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/764-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/792-49-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/792-89-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1188-91-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1188-40-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1880-88-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1880-56-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2172-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2172-97-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3048-65-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3048-86-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3248-77-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4000-101-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4000-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/4000-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4264-99-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4264-8-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4760-32-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4760-93-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4804-95-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4804-24-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB