Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe
Resource
win10v2004-20241007-en
General
-
Target
308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe
-
Size
460KB
-
MD5
57a586976c44d034078b0e45a054c22d
-
SHA1
334d278de3a312af1087a2d6cd2a9bbdcce7fa68
-
SHA256
308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a
-
SHA512
336db006263638fe5deea04b2efc37940b53a9915cd2fc717f531ab4b0bbd4198a0293a2eacf90f6f7731028d2e86c589801e79054fea7d7ac27d0adce851342
-
SSDEEP
6144:R+nZKDqXSTYaT15f7o+STYaT15fKj+v3WTlcy6TR9TbM:R+ZKDvTYapJoTYapI2mTlQTfTQ
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe -
Berbew family
-
Executes dropped EXE 3 IoCs
pid Process 452 Dfnjafap.exe 1640 Dmjocp32.exe 2964 Dmllipeg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bobiobnp.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Dfnjafap.exe 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe File created C:\Windows\SysWOW64\Poahbe32.dll 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dmjocp32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3520 2964 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2272 wrote to memory of 452 2272 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe 83 PID 2272 wrote to memory of 452 2272 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe 83 PID 2272 wrote to memory of 452 2272 308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe 83 PID 452 wrote to memory of 1640 452 Dfnjafap.exe 84 PID 452 wrote to memory of 1640 452 Dfnjafap.exe 84 PID 452 wrote to memory of 1640 452 Dfnjafap.exe 84 PID 1640 wrote to memory of 2964 1640 Dmjocp32.exe 85 PID 1640 wrote to memory of 2964 1640 Dmjocp32.exe 85 PID 1640 wrote to memory of 2964 1640 Dmjocp32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe"C:\Users\Admin\AppData\Local\Temp\308d247c2f455dc6688b1dc00b84641ada8d21802581a0d35ec9071ba3b4b91a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 3965⤵
- Program crash
PID:3520
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2964 -ip 29641⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD5dda9c227cf5e75d5c9701b6eb9ae9168
SHA13717cfc2cd6a3d62a258134f79a594c2bdc4d552
SHA2569f3ae45344b76405d1ae2ffa1ec0415ef66ce2933a462a609860a93278d7d6ca
SHA5124b8a67a4f1bd57b94cad983e3b1c89af1f8e00031002a9f5d51c4f5cd3ce605786dac9e8e3460f42205701de85f8c7057b6c07b4dd4bc2786581b515a0b29404
-
Filesize
460KB
MD561d618a8ec34b5ab1623b068c277bd38
SHA14844f115b45c2fc648dc4905fbf94efec36d5f6f
SHA256ccecb556e94979fe1624673f575b4c7d72b4308fa02bb54986184d30eb40cf83
SHA512a5864c41e7c5072065a387e9c95adaf2c41bce0f1363f3b2548a61490af83da5661c89214e54f19cc1d6c8626e5e3fd2b01b8c897a050fa513bf428ff0071c8e
-
Filesize
460KB
MD589b3f8eaf121712b14801811915c47cd
SHA12ec6733da5e20d778affb31146af0cfe2c5ab532
SHA25607500d856d73f164d39c7e524f434a698050b14a1dcf4afaadd81ac3b67f840e
SHA512ba90229af9ae4215b9392546818f21fa9798cf270c564f11c14636010394d2f67b6f2f8196239e43e4b2d51b262480495e5e4301e7c4e4283824a81f4ac3ce46