Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe
Resource
win7-20240729-en
General
-
Target
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe
-
Size
255KB
-
MD5
9e989a0a54365f45d499a583f92f0c89
-
SHA1
d97c9b46620508ce3011f1e22f6190d4a7b20595
-
SHA256
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d
-
SHA512
640863cf9df2c8dd3056263b316a183354a42f0e1cb8b70b0fb6fe37e19c6e3ac8d3b1f0040d0c38bc8fd10f6662f83b8f5df8c0b278c8385596669717b2dff9
-
SSDEEP
6144:B0KY+vnrXeWFnTf2xUS6UJjwszeXmDZUH8aiGaEP:DrXeWFWj6YjzZUH8awEP
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
Processes:
Lkjmfjmi.exec2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkjmfjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkjmfjmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lemdncoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lemdncoa.exe -
Berbew family
-
Executes dropped EXE 3 IoCs
Processes:
Lemdncoa.exeLkjmfjmi.exeLepaccmo.exepid process 2728 Lemdncoa.exe 2164 Lkjmfjmi.exe 2820 Lepaccmo.exe -
Loads dropped DLL 10 IoCs
Processes:
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exeLkjmfjmi.exeWerFault.exepid process 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe 2728 Lemdncoa.exe 2728 Lemdncoa.exe 2164 Lkjmfjmi.exe 2164 Lkjmfjmi.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Drops file in System32 directory 9 IoCs
Processes:
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exeLkjmfjmi.exedescription ioc process File created C:\Windows\SysWOW64\Lemdncoa.exe c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe File created C:\Windows\SysWOW64\Lioglifg.dll c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe File created C:\Windows\SysWOW64\Lkjmfjmi.exe Lemdncoa.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Lkjmfjmi.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Lkjmfjmi.exe File opened for modification C:\Windows\SysWOW64\Lemdncoa.exe c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe File opened for modification C:\Windows\SysWOW64\Lkjmfjmi.exe Lemdncoa.exe File created C:\Windows\SysWOW64\Iekhhnol.dll Lemdncoa.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lkjmfjmi.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2748 2820 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exeLkjmfjmi.exeLepaccmo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lemdncoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkjmfjmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe -
Modifies registry class 12 IoCs
Processes:
Lkjmfjmi.exec2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkjmfjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Lkjmfjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkjmfjmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lemdncoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lemdncoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lioglifg.dll" c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iekhhnol.dll" Lemdncoa.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exeLemdncoa.exeLkjmfjmi.exeLepaccmo.exedescription pid process target process PID 2412 wrote to memory of 2728 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Lemdncoa.exe PID 2412 wrote to memory of 2728 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Lemdncoa.exe PID 2412 wrote to memory of 2728 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Lemdncoa.exe PID 2412 wrote to memory of 2728 2412 c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe Lemdncoa.exe PID 2728 wrote to memory of 2164 2728 Lemdncoa.exe Lkjmfjmi.exe PID 2728 wrote to memory of 2164 2728 Lemdncoa.exe Lkjmfjmi.exe PID 2728 wrote to memory of 2164 2728 Lemdncoa.exe Lkjmfjmi.exe PID 2728 wrote to memory of 2164 2728 Lemdncoa.exe Lkjmfjmi.exe PID 2164 wrote to memory of 2820 2164 Lkjmfjmi.exe Lepaccmo.exe PID 2164 wrote to memory of 2820 2164 Lkjmfjmi.exe Lepaccmo.exe PID 2164 wrote to memory of 2820 2164 Lkjmfjmi.exe Lepaccmo.exe PID 2164 wrote to memory of 2820 2164 Lkjmfjmi.exe Lepaccmo.exe PID 2820 wrote to memory of 2748 2820 Lepaccmo.exe WerFault.exe PID 2820 wrote to memory of 2748 2820 Lepaccmo.exe WerFault.exe PID 2820 wrote to memory of 2748 2820 Lepaccmo.exe WerFault.exe PID 2820 wrote to memory of 2748 2820 Lepaccmo.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe"C:\Users\Admin\AppData\Local\Temp\c2d713ffe01d040a0cf2c9959bfc8ad0dbdb8c03cadf1771d46e11a4707ff85d.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Lemdncoa.exeC:\Windows\system32\Lemdncoa.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Lkjmfjmi.exeC:\Windows\system32\Lkjmfjmi.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD54cdd875a1472e49bbe6c8b9cfa7ecb3d
SHA150d93d1811180f236c06b9aee733b6b3a7370fe3
SHA256caad93b4627526da10da7f06058160f83560a7215be77e66fc65e72d58604a92
SHA51271b9166f7afc4338d74b4423a2c5da4892363f2ff852a0cb9ebb2bbc348404a7db5ee2f334a2fecd9d525c1764c828e71d1656e3df9509cf2de37fc0abf20110
-
Filesize
255KB
MD58d47fcd18794847e2415fb140d4e98cc
SHA143948ffda06fb4af618d1fe4cf1b7963aeb7eb8f
SHA25673b27cd7b98a15f4964e09c0a767c59687dec03000831dc84ff89ae4764465e2
SHA512a659bc41d420fbcca20053c9a79f17b34fe0025b4eef3c90af6a4ce8e38cb671e7ba4d94c39d0c7b8dfec8850916ae1792a084d3c963cf6a30888d1d8c07da03
-
Filesize
255KB
MD59521f34bb1d8a7b3b0fd9e038621ed05
SHA1c9bd1199ba3c283efeab37925f8c96b5cd5e304b
SHA256d5e96410def276dd931286ca5624ebe430745670ece16e90ad6acf531c11fe4f
SHA5124d3c3800f96a5662f12fabc55194e36cd149a5976dfc5aba3549b157117b5efdf612801f917ba5a4aafb0b3d59025609b132c73c40d77d40717fd5f7a8b8e106