Analysis

  • max time kernel
    23s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2024 11:40

General

  • Target

    1747c8a0740aad50c1f4e0d64ddc92dfbdb0cf4e84c391e1e7b430f0d01e4dd1N.exe

  • Size

    96KB

  • MD5

    cc43d64c7d16a5d1b195fb4a20c3a5c0

  • SHA1

    53bd2be4ce291ff0984e58718e2a2ff8d6782a70

  • SHA256

    1747c8a0740aad50c1f4e0d64ddc92dfbdb0cf4e84c391e1e7b430f0d01e4dd1

  • SHA512

    ed830da1366ac3df61877e7400a05481ea2c84acf60d6155720efce5f00d9c5ffcaf111a3d6d9ea629c724d2bd40a7621b49f16b5a7fc2a71e35c8511d0dffd8

  • SSDEEP

    1536:aCUppyhDhGKqL0U6jPaMtfGjV2LN7RZObZUUWaegPYA:ajpM/qLt6jPPOSNClUUWae

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 26 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 30 IoCs
  • Drops file in System32 directory 39 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 42 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1747c8a0740aad50c1f4e0d64ddc92dfbdb0cf4e84c391e1e7b430f0d01e4dd1N.exe
    "C:\Users\Admin\AppData\Local\Temp\1747c8a0740aad50c1f4e0d64ddc92dfbdb0cf4e84c391e1e7b430f0d01e4dd1N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\Blaopqpo.exe
      C:\Windows\system32\Blaopqpo.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\Boplllob.exe
        C:\Windows\system32\Boplllob.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\Baohhgnf.exe
          C:\Windows\system32\Baohhgnf.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\SysWOW64\Bmeimhdj.exe
            C:\Windows\system32\Bmeimhdj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:112
            • C:\Windows\SysWOW64\Cdoajb32.exe
              C:\Windows\system32\Cdoajb32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Windows\SysWOW64\Cfnmfn32.exe
                C:\Windows\system32\Cfnmfn32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1988
                • C:\Windows\SysWOW64\Cmgechbh.exe
                  C:\Windows\system32\Cmgechbh.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2232
                  • C:\Windows\SysWOW64\Cpfaocal.exe
                    C:\Windows\system32\Cpfaocal.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2100
                    • C:\Windows\SysWOW64\Cgpjlnhh.exe
                      C:\Windows\system32\Cgpjlnhh.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3004
                      • C:\Windows\SysWOW64\Cinfhigl.exe
                        C:\Windows\system32\Cinfhigl.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1752
                        • C:\Windows\SysWOW64\Cphndc32.exe
                          C:\Windows\system32\Cphndc32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2888
                          • C:\Windows\SysWOW64\Cgbfamff.exe
                            C:\Windows\system32\Cgbfamff.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3016
                            • C:\Windows\SysWOW64\Ceegmj32.exe
                              C:\Windows\system32\Ceegmj32.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:1940
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 140
                                15⤵
                                • Loads dropped DLL
                                • Program crash
                                PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Blaopqpo.exe

    Filesize

    96KB

    MD5

    759c52627c46c74636ccce4b895bea81

    SHA1

    2d8f6cac6961ff9127c6d71b3b3d752383871fd1

    SHA256

    6f981aeec05ff2139d64234b2d26a9c14e70928879dec5801ded17f327fefb6c

    SHA512

    7045769b83dc2a6f263ead4784e912b70d6d54f35e81ff9125e77550805ab5b0077b97d0c76f0c869c69ae716425e4f1e3702baea24cf578aa7afcaa0ae7de3b

  • C:\Windows\SysWOW64\Boplllob.exe

    Filesize

    96KB

    MD5

    d175e3ccf4fef19c85c935f9550299e4

    SHA1

    2a93babc29b2005ab75bb65df947a98220f13466

    SHA256

    eea1f6168179fbb46c4b7a22e210569ca90a64ff4aefba1118c2aff3358549dd

    SHA512

    73b05c510279940bbcdcad2d2eceec5947c282739df2698e4ea91e1ec076ea5d7ab29a094fa53dcb35f47d98040650c661c4b5c8541015ce150b4ee62f8aa83a

  • \Windows\SysWOW64\Baohhgnf.exe

    Filesize

    96KB

    MD5

    bf22232e5207271e7997e5e5c11e3a03

    SHA1

    16178ba06d509c201f14cf30bf5e5a4d29819d35

    SHA256

    ee317edef9c03d65225853dd204579309e1ebb9206f3d71f3550b89625debc64

    SHA512

    98136bd83ad7ab6cdb56cf02ea709fb2448db64f060ea5bdfa26b327d3e8f2bb02bf82b3a90148989a143b03b3ada97d54b6f93049daa89331a444d128eb9e15

  • \Windows\SysWOW64\Bmeimhdj.exe

    Filesize

    96KB

    MD5

    d2e758c08a012e713dc4de5c7ec9f0b4

    SHA1

    ba5bf0a80d0949e9d9235e9d041ab5c44eb02e6d

    SHA256

    1fec827d9365d8c919b4091988cab569652a380530a20d1ce42981441c9c37d1

    SHA512

    569bc4de06572a3f2ef040ebdc589cf69ce86d7bf003f9cef9d4de6192f5f62f19b6ec9e05f64b0e1affa1bda6cced1eb11a153bd975324d80b9514e7417f9c0

  • \Windows\SysWOW64\Cdoajb32.exe

    Filesize

    96KB

    MD5

    58d2ae9857489605860fc184eeb1e50f

    SHA1

    06cb55714b52ed4d8088e9524c30a6580ae00599

    SHA256

    24656cfcdec217002c0f09317c8e73be699cd358dd754ebd7874aa53e6812288

    SHA512

    8fc79cae786503e91c2fe398e67d27d1547b0c0010c7483d29c211203dc1f3f7f4db0f937fb592885540dfdb99466ea556828db0a12392525acca841a43d5c4f

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    96KB

    MD5

    e9ed8e116b86ef2638fe885899c0d24b

    SHA1

    eb70802ce09b81e7773c846b49942726d238ea40

    SHA256

    9f850a5c096ce50ecc089b231f8cd6e321fd5016fc2c0c7bfd28e977ce0abc23

    SHA512

    985fe074755b9473d3733d7bafd0ea55e052292ca06d1934b8e1ab5b33700f268829205813cebab66b94ed00f125ea950f419d8dce71ceb256be6ccc4066f43e

  • \Windows\SysWOW64\Cfnmfn32.exe

    Filesize

    96KB

    MD5

    738a09bbe5602d364d983441c9bd1026

    SHA1

    009aa537c1d0602c501f263d211c81c10f39fa9f

    SHA256

    c62da18bf8a6593a6498a848d150a320dbc7a35e4f5f271aaf8d9aad3c456b1b

    SHA512

    9fbb5d132ce7b906b88f7bf63cd5f3b3007695cd5ea58bbd5558887ef28ed5a264550a1f2f2be2c2207dbf830dee8e44f9b6dcf11a70fd12f030c04be019d492

  • \Windows\SysWOW64\Cgbfamff.exe

    Filesize

    96KB

    MD5

    7aff8f1dc225e522da174790c8442148

    SHA1

    8e596f5bc9ee1169f67af1a28a3cc1b0dac3eaa1

    SHA256

    1e07236a9877ba07ed317269ebbc41f8bd3ceee66fb822c5399ff11d0c31a928

    SHA512

    73db0c2fc81d1f3d6bf3143f4adb62769306be2180d4efa0e3f70f402ad756871db5ffb0b292d9032d4bd8b598a5582ae701422f621a2229a67788261a9f369c

  • \Windows\SysWOW64\Cgpjlnhh.exe

    Filesize

    96KB

    MD5

    30d16f7036c18707c58da6b3f15f1701

    SHA1

    b0a2d40a2a4d3288e7d5a86e246f7b5ed20a0fe0

    SHA256

    23a0a5014038d4d5f4e792cccf9abe58b41eb83ebcc3d59d4fe98b6cfb2a65e4

    SHA512

    7fbbecb71602811a8da4f6035ca5861328ea4dbe93fe42e020b339147d1f9d62a7f4706f80ee31517ee6ef0c1c6b26386403f74a57e417cbcbc93a2f4b6f5ee4

  • \Windows\SysWOW64\Cinfhigl.exe

    Filesize

    96KB

    MD5

    54ffb885beaf687b14c944ad2ad4379e

    SHA1

    f2ce51eb1e78aeed7209b7f27063a7d0286dd0f7

    SHA256

    09359ac2843ef34bae2fe2ca8037abca473439bd77af0552efa0756aad040821

    SHA512

    0e20da174ace93c0488348f823a42490a4864719e0e78f51e2d6a89d9cd67592f09c90c499d41e5e517f8404e203db64692b332b434ea0d5a499f269aba859c5

  • \Windows\SysWOW64\Cmgechbh.exe

    Filesize

    96KB

    MD5

    a514e204fc0a6bba480a43b0b5319869

    SHA1

    c9f23359b9653fca9257c8a8fd36736551243200

    SHA256

    4cca4953121b98502304432deca0856573d9c2a1a787e1a3bdd56197671184ad

    SHA512

    fd6eb061faeed3aa3b660867d4f50309d118b2ba3b8ed9f2e6150c7ff1a0bc1fef8854cb9b0a41f0836638406b1b5fb1d668e257678c35e19720f41170ecafa3

  • \Windows\SysWOW64\Cpfaocal.exe

    Filesize

    96KB

    MD5

    c998d2ee18f8bbb7b7fb8ec0e8c71607

    SHA1

    cc3d1d8c6ba7c7d9e64e83cccead9422fe5e7499

    SHA256

    687b97005267b2f9f1b37a0e4f0fd8eb00c85758e76c94a161d5497257c7095c

    SHA512

    9e0a833147416de13a0ec314ac4379786d24b1babd2eee089dcdd4d139608a75cab770c135a5d640a56829a452e91d51a6ea9e09fce7b68d0d094aadb23901d5

  • \Windows\SysWOW64\Cphndc32.exe

    Filesize

    96KB

    MD5

    e3bacd7528d8cbdd8d446c5ef32d5eef

    SHA1

    41ec05f3a8d454751d9fe2f5512a5a9f59817b18

    SHA256

    f25ea4c2f027dbd4e72f1c800a4fdde232aefeafcfb99d190c3f3ce294aef230

    SHA512

    e6efa45ae7084871440fa80b16daaa1cc43ef31d186670d88ccbe733b8f82dc519930fbf60d5809c49fdc6f54bef07088dd4446a271dd897f3be9f5b20887836

  • memory/112-188-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/112-62-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/1752-182-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1752-141-0x0000000001F30000-0x0000000001F63000-memory.dmp

    Filesize

    204KB

  • memory/1940-189-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1988-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1988-88-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/1988-179-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2100-114-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/2100-107-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2100-185-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2232-181-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2328-25-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2520-68-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2520-187-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2820-40-0x0000000001F30000-0x0000000001F63000-memory.dmp

    Filesize

    204KB

  • memory/2820-35-0x0000000001F30000-0x0000000001F63000-memory.dmp

    Filesize

    204KB

  • memory/2820-191-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2820-27-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2824-49-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2824-186-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2888-184-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2932-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2932-17-0x0000000000260000-0x0000000000293000-memory.dmp

    Filesize

    204KB

  • memory/2932-18-0x0000000000260000-0x0000000000293000-memory.dmp

    Filesize

    204KB

  • memory/2932-192-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3004-133-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/3004-180-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3016-160-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3016-183-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3016-166-0x0000000000260000-0x0000000000293000-memory.dmp

    Filesize

    204KB