Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 10:56

General

  • Target

    ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe

  • Size

    69KB

  • MD5

    f08208772c681a333987889a7d8c9df7

  • SHA1

    d02e2f080b9a7fd5ecb3dc9c090233d1535afd9b

  • SHA256

    ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f

  • SHA512

    5792e3fb889fff441eae78f1637e5e9036a05c1f96ab146607402858ceedfbb7cfb6d3f8ab49300eb640f3bd20406663765543207aba5fffebd918f630b58155

  • SSDEEP

    768:N251V1a0PQFWkVNcrFB8phzBkyevyfuWffEBAgn9NIP/1H58VU9UiEb/KEiEixVR:s5hayJ88B7X7xMhbPgUN3QivEg

Malware Config

Extracted

Family

berbew

C2

http://tat-neftbank.ru/kkq.php

http://tat-neftbank.ru/wcmd.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe
    "C:\Users\Admin\AppData\Local\Temp\ea57980c4f83c86e67990216ec214a28ed92496526197f77188901fb0e593d9f.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\Danpemej.exe
      C:\Windows\system32\Danpemej.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\Dpapaj32.exe
        C:\Windows\system32\Dpapaj32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 144
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Danpemej.exe

    Filesize

    69KB

    MD5

    d2f98d8a2d15a583d53a60f3ae11d456

    SHA1

    6b03bd708fe542391085362f2f95a457ceab33ff

    SHA256

    72a1edc99a75fb46ae5c2ef632a34413a2b4b30624b109237b8dcbda3a7df3af

    SHA512

    b5dd1b00857e7b987a9c3665d1cce013a2f466da31b48a672f638731ad7602e088831b23a7b8baa39f40537f831985f7da78fd70b1752c07d6deb4ad7b5e266a

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    69KB

    MD5

    00ebc75126c5aed09229aacdc49845c2

    SHA1

    90f8c35f7f412e376aa372ded648cb14c5592c7d

    SHA256

    dc03dd323a3f50bfc685f6d138434501c5b2c4d1a929dd8726bc5ae5fa65bd9a

    SHA512

    e20db89f89667cf8f986ea61e91557b5228e6f8d21381e58d7e7597ba1044d7c067d60b44de51f6b841351aaa78e42974e49210a7fdb218db4dc144edb436fd2

  • memory/1040-35-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2148-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2148-12-0x0000000000260000-0x000000000029C000-memory.dmp

    Filesize

    240KB

  • memory/2148-33-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2844-13-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2844-20-0x0000000000250000-0x000000000028C000-memory.dmp

    Filesize

    240KB

  • memory/2844-34-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB