Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 23:22
Behavioral task
behavioral1
Sample
adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe
Resource
win7-20241010-en
General
-
Target
adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe
-
Size
337KB
-
MD5
df3fb967619e50c6493ff617e5f01df0
-
SHA1
39d71bb9b1ea32d931a79d9d4b3ffda7195f4e02
-
SHA256
adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6
-
SHA512
a411766015e70075141618cabdb9a37f45f8b19bd5e759b0e13b28ce6527f7d0df6a630c127e97ea141ece4013842b252cf2c154afb0036279fec52a0a0d3621
-
SSDEEP
6144:sz3tRJ4222222222222229AY1+fIyG5jZkCwi8r:S3tRJTiZkCwiY
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abeghmmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgiibp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abeghmmn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeepjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeepjh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjeihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjeihl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgiibp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anndbnao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anndbnao.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 6 IoCs
pid Process 2252 Qjeihl32.exe 2968 Qgiibp32.exe 2940 Abeghmmn.exe 3068 Aeepjh32.exe 2796 Anndbnao.exe 2860 Bmenijcd.exe -
Loads dropped DLL 16 IoCs
pid Process 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 2252 Qjeihl32.exe 2252 Qjeihl32.exe 2968 Qgiibp32.exe 2968 Qgiibp32.exe 2940 Abeghmmn.exe 2940 Abeghmmn.exe 3068 Aeepjh32.exe 3068 Aeepjh32.exe 2796 Anndbnao.exe 2796 Anndbnao.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Abeghmmn.exe Qgiibp32.exe File created C:\Windows\SysWOW64\Gjjhgphb.dll Abeghmmn.exe File created C:\Windows\SysWOW64\Anndbnao.exe Aeepjh32.exe File opened for modification C:\Windows\SysWOW64\Bmenijcd.exe Anndbnao.exe File created C:\Windows\SysWOW64\Hncklnkp.dll adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe File created C:\Windows\SysWOW64\Qgiibp32.exe Qjeihl32.exe File opened for modification C:\Windows\SysWOW64\Aeepjh32.exe Abeghmmn.exe File opened for modification C:\Windows\SysWOW64\Qjeihl32.exe adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe File opened for modification C:\Windows\SysWOW64\Qgiibp32.exe Qjeihl32.exe File created C:\Windows\SysWOW64\Jegphc32.dll Aeepjh32.exe File created C:\Windows\SysWOW64\Aeepjh32.exe Abeghmmn.exe File opened for modification C:\Windows\SysWOW64\Anndbnao.exe Aeepjh32.exe File opened for modification C:\Windows\SysWOW64\Abeghmmn.exe Qgiibp32.exe File created C:\Windows\SysWOW64\Bdinjj32.dll Qgiibp32.exe File created C:\Windows\SysWOW64\Bmenijcd.exe Anndbnao.exe File created C:\Windows\SysWOW64\Diflambo.dll Anndbnao.exe File created C:\Windows\SysWOW64\Qjeihl32.exe adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe File created C:\Windows\SysWOW64\Iindag32.dll Qjeihl32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2860 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmenijcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjeihl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgiibp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abeghmmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeepjh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anndbnao.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qgiibp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abeghmmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jegphc32.dll" Aeepjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjeihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qjeihl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anndbnao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diflambo.dll" Anndbnao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anndbnao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hncklnkp.dll" adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qgiibp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeepjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeepjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iindag32.dll" Qjeihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdinjj32.dll" Qgiibp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjjhgphb.dll" Abeghmmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abeghmmn.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2252 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 30 PID 2108 wrote to memory of 2252 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 30 PID 2108 wrote to memory of 2252 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 30 PID 2108 wrote to memory of 2252 2108 adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe 30 PID 2252 wrote to memory of 2968 2252 Qjeihl32.exe 31 PID 2252 wrote to memory of 2968 2252 Qjeihl32.exe 31 PID 2252 wrote to memory of 2968 2252 Qjeihl32.exe 31 PID 2252 wrote to memory of 2968 2252 Qjeihl32.exe 31 PID 2968 wrote to memory of 2940 2968 Qgiibp32.exe 32 PID 2968 wrote to memory of 2940 2968 Qgiibp32.exe 32 PID 2968 wrote to memory of 2940 2968 Qgiibp32.exe 32 PID 2968 wrote to memory of 2940 2968 Qgiibp32.exe 32 PID 2940 wrote to memory of 3068 2940 Abeghmmn.exe 33 PID 2940 wrote to memory of 3068 2940 Abeghmmn.exe 33 PID 2940 wrote to memory of 3068 2940 Abeghmmn.exe 33 PID 2940 wrote to memory of 3068 2940 Abeghmmn.exe 33 PID 3068 wrote to memory of 2796 3068 Aeepjh32.exe 34 PID 3068 wrote to memory of 2796 3068 Aeepjh32.exe 34 PID 3068 wrote to memory of 2796 3068 Aeepjh32.exe 34 PID 3068 wrote to memory of 2796 3068 Aeepjh32.exe 34 PID 2796 wrote to memory of 2860 2796 Anndbnao.exe 35 PID 2796 wrote to memory of 2860 2796 Anndbnao.exe 35 PID 2796 wrote to memory of 2860 2796 Anndbnao.exe 35 PID 2796 wrote to memory of 2860 2796 Anndbnao.exe 35 PID 2860 wrote to memory of 2580 2860 Bmenijcd.exe 36 PID 2860 wrote to memory of 2580 2860 Bmenijcd.exe 36 PID 2860 wrote to memory of 2580 2860 Bmenijcd.exe 36 PID 2860 wrote to memory of 2580 2860 Bmenijcd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe"C:\Users\Admin\AppData\Local\Temp\adc7b9fbbcb94fda6b9f304cebbe3c1b3f350fad4a805b82017f1885033bb1b6N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Qjeihl32.exeC:\Windows\system32\Qjeihl32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Qgiibp32.exeC:\Windows\system32\Qgiibp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Abeghmmn.exeC:\Windows\system32\Abeghmmn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Aeepjh32.exeC:\Windows\system32\Aeepjh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Anndbnao.exeC:\Windows\system32\Anndbnao.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Bmenijcd.exeC:\Windows\system32\Bmenijcd.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5368e632460c02f694358db86f931975f
SHA1eebaf6b417d6011b36a0314498a79c4749633286
SHA2569dc366a6b4dee86af1881ac9b9224b15df0f738238b1417e3f27321676075760
SHA5122fb81221ad9bc352fef930d10488e37e21ca144ad24364b650663c4849dc3d6b170a4756bcbbee66d12fa0ff7ce1aea59920ea4e338d8e44610712c1767050e8
-
Filesize
337KB
MD5f88675cbb22a6568d9f00f5720d4c858
SHA184a4454cf6dee8970cafb3b52b9b130af4c92b35
SHA256b974d16e81dba0d87e6f93087f0629737e2952529652ae47154f2bf2d55fee79
SHA512a0df65218ce68030a754aad1dd793392af16f63762badb7a1f7f457f06274e94df3c97b241ce582cef01bf8ce8c822b042080a100037c7044d96c6789da67f12
-
Filesize
337KB
MD507e03e58a3d3e550fd5e6e56fa0d0684
SHA17620543e1294cc64ef1eff57a359ae2acbebf7cc
SHA2566ab8daf9fe7404a273c678090830404649aa4dbaf529df145bbe2a15aef0da71
SHA512aaeb53f8f3ed02cc93bc3de9eb4a983f64a95309258e023515b81e7814373ef65b403d682611ee2ec70bcfdb2aa8ce1dc7459c6e2ba00305ea8a2425f9d67ff4
-
Filesize
337KB
MD54b0b74f8cba0744046d683be06f74b39
SHA1e7f4376e789ec0a47f40c66114698fd06a1181b8
SHA25669d50e7013f08b13f5c6082b0fe4d3ab8c23786f754e24c81e834787c0c52c61
SHA512def5afa7ecbce1502e7e96dbd638f6de8e383239b0f12eafe17ad52f10831907bb0a6e454335fa37c9ee081c76988819d0d409fa434749aaf4e3efd3b8373ed6
-
Filesize
337KB
MD59556ad501d45302ce8c6480a93e5e0aa
SHA1b9b9fb71e630e89f80c18ff80953a6707dd6daa7
SHA256fb878152bd6cf68da3fbef09dc0444940499b43d037767a23c62b280bafd96ac
SHA512529380185224459edaf00910205ae45e4ec41d37b0696da4c2e7168a94e850a84041fef71647a4227c4d9fed5d34fe942e008bbbd304311d27923003f73c57fe
-
Filesize
337KB
MD5fb11eaad28bf844d643b8bb3b2acfb29
SHA19c9eb6793d0a1e99f062d2418a8d8b3c8f303db9
SHA256f720cd25c86a282580b59af8238de95695cdbe8d9a154d5e0031e32b9ab1af4f
SHA512be511b9d3ae62dbcf52cb68f29a28fee52bbea4987f686da6fa60993e153763cfbbb962d811eecc1f11789c4c39d3a5eeacac39f094a9caee1605f888568b97f