Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe
Resource
win7-20240903-en
General
-
Target
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe
-
Size
69KB
-
MD5
f08208772c681a333987889a7d8c9df7
-
SHA1
d02e2f080b9a7fd5ecb3dc9c090233d1535afd9b
-
SHA256
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f
-
SHA512
5792e3fb889fff441eae78f1637e5e9036a05c1f96ab146607402858ceedfbb7cfb6d3f8ab49300eb640f3bd20406663765543207aba5fffebd918f630b58155
-
SSDEEP
768:N251V1a0PQFWkVNcrFB8phzBkyevyfuWffEBAgn9NIP/1H58VU9UiEb/KEiEixVR:s5hayJ88B7X7xMhbPgUN3QivEg
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
Processes:
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exeDanpemej.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danpemej.exe -
Berbew family
-
Executes dropped EXE 2 IoCs
Processes:
Danpemej.exeDpapaj32.exepid process 2844 Danpemej.exe 1040 Dpapaj32.exe -
Loads dropped DLL 7 IoCs
Processes:
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exeDanpemej.exeWerFault.exepid process 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe 2844 Danpemej.exe 2844 Danpemej.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe -
Drops file in System32 directory 6 IoCs
Processes:
Danpemej.exeea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exedescription ioc process File created C:\Windows\SysWOW64\Pdkefp32.dll Danpemej.exe File created C:\Windows\SysWOW64\Danpemej.exe ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe File opened for modification C:\Windows\SysWOW64\Danpemej.exe ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe File created C:\Windows\SysWOW64\Cbehjc32.dll ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe -
Drops file in Windows directory 2 IoCs
Processes:
Dpapaj32.exedescription ioc process File created C:\Windows\system32†Dfkhndca.¿xe Dpapaj32.exe File opened for modification C:\Windows\system32†Dfkhndca.¿xe Dpapaj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2920 1040 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Danpemej.exeDpapaj32.exeea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danpemej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe -
Modifies registry class 9 IoCs
Processes:
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exeDanpemej.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbehjc32.dll" ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danpemej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exeDanpemej.exeDpapaj32.exedescription pid process target process PID 2148 wrote to memory of 2844 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Danpemej.exe PID 2148 wrote to memory of 2844 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Danpemej.exe PID 2148 wrote to memory of 2844 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Danpemej.exe PID 2148 wrote to memory of 2844 2148 ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe Danpemej.exe PID 2844 wrote to memory of 1040 2844 Danpemej.exe Dpapaj32.exe PID 2844 wrote to memory of 1040 2844 Danpemej.exe Dpapaj32.exe PID 2844 wrote to memory of 1040 2844 Danpemej.exe Dpapaj32.exe PID 2844 wrote to memory of 1040 2844 Danpemej.exe Dpapaj32.exe PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe WerFault.exe PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe WerFault.exe PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe WerFault.exe PID 1040 wrote to memory of 2920 1040 Dpapaj32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe"C:\Users\Admin\AppData\Local\Temp\ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Danpemej.exeC:\Windows\system32\Danpemej.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 1444⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5d2f98d8a2d15a583d53a60f3ae11d456
SHA16b03bd708fe542391085362f2f95a457ceab33ff
SHA25672a1edc99a75fb46ae5c2ef632a34413a2b4b30624b109237b8dcbda3a7df3af
SHA512b5dd1b00857e7b987a9c3665d1cce013a2f466da31b48a672f638731ad7602e088831b23a7b8baa39f40537f831985f7da78fd70b1752c07d6deb4ad7b5e266a
-
Filesize
69KB
MD500ebc75126c5aed09229aacdc49845c2
SHA190f8c35f7f412e376aa372ded648cb14c5592c7d
SHA256dc03dd323a3f50bfc685f6d138434501c5b2c4d1a929dd8726bc5ae5fa65bd9a
SHA512e20db89f89667cf8f986ea61e91557b5228e6f8d21381e58d7e7597ba1044d7c067d60b44de51f6b841351aaa78e42974e49210a7fdb218db4dc144edb436fd2