Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe
Resource
win10v2004-20241007-en
General
-
Target
0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe
-
Size
96KB
-
MD5
d7388294fc29e17806c9140899059da1
-
SHA1
189c330f4fa38425c75bf5574ecc839a4cad156b
-
SHA256
0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e
-
SHA512
77bf69856644b04a7679818af5d604ab5eceeeda2d4a60c57f759a6ee37a960ece3959814cf593829df80e9fd833b195f808f64d1554ac32d1eaada9b2607812
-
SSDEEP
1536:lAddaQqaSC2BlTj5PTYOXnd62Lv7RZObZUUWaegPYAG:lAdBedbZTYOXdHvClUUWae9
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe -
Berbew family
-
Executes dropped EXE 6 IoCs
pid Process 3724 Delnin32.exe 3512 Dfnjafap.exe 2244 Daconoae.exe 1676 Dogogcpo.exe 920 Dgbdlf32.exe 764 Dmllipeg.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Delnin32.exe 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe File created C:\Windows\SysWOW64\Daconoae.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Daconoae.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe File created C:\Windows\SysWOW64\Poahbe32.dll Delnin32.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 764 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3724 2104 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe 82 PID 2104 wrote to memory of 3724 2104 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe 82 PID 2104 wrote to memory of 3724 2104 0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe 82 PID 3724 wrote to memory of 3512 3724 Delnin32.exe 83 PID 3724 wrote to memory of 3512 3724 Delnin32.exe 83 PID 3724 wrote to memory of 3512 3724 Delnin32.exe 83 PID 3512 wrote to memory of 2244 3512 Dfnjafap.exe 84 PID 3512 wrote to memory of 2244 3512 Dfnjafap.exe 84 PID 3512 wrote to memory of 2244 3512 Dfnjafap.exe 84 PID 2244 wrote to memory of 1676 2244 Daconoae.exe 85 PID 2244 wrote to memory of 1676 2244 Daconoae.exe 85 PID 2244 wrote to memory of 1676 2244 Daconoae.exe 85 PID 1676 wrote to memory of 920 1676 Dogogcpo.exe 86 PID 1676 wrote to memory of 920 1676 Dogogcpo.exe 86 PID 1676 wrote to memory of 920 1676 Dogogcpo.exe 86 PID 920 wrote to memory of 764 920 Dgbdlf32.exe 87 PID 920 wrote to memory of 764 920 Dgbdlf32.exe 87 PID 920 wrote to memory of 764 920 Dgbdlf32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe"C:\Users\Admin\AppData\Local\Temp\0832f97c730c64fc42df3b768564486cec9e637c225f042638a0e47b100c060e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 4048⤵
- Program crash
PID:2732
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 764 -ip 7641⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b9909e23386206ee1da89d9f46e54d5b
SHA14ead52e850c0213dc55f660c1c59c9331c54b614
SHA256e2e830ebb86694422132d62bb25f36be7f9a6cb9ae2e088253b7a8c017a8dbc6
SHA51202c9125860725934f8c1355bca93e7fcbf3270559889e8511f107e1867cdfff34146b4c9423ee9b7b3b180e8250260df0f75c50182b11b62ea83b33a39a315e8
-
Filesize
96KB
MD589b4546bac2330155176550d9a6c8403
SHA1f9a921a1733ff98ac39fcb978395647d69df6fdf
SHA256d9f285bd344f6b0d56ad8cb4702c3b126a275cc308cae114cf4251aee385ef6e
SHA512c20c081a34a7528ed96a5a953f27499503f976ca65541d2f4c409b31428d1462786b683ed969557a14946be950b955b7819e2aa1549d504edb689b3d404373ae
-
Filesize
96KB
MD59beae04192543394b9ad84b5f0ce84de
SHA1f556e4d8b2ad2b6b38d62e6d1e11bc0b381d7b32
SHA25663aaf4b22f33c2e475d021421e69d49a469c1a188d8f2b8591714284c526766a
SHA512ae3386282bcbe39d6d556125cf526a22084b850af6470f8ea34502b535c27cc563b1d499b56741437454390a11459e0dc654dba938165a0266a9076f76985e33
-
Filesize
96KB
MD53f73414e02e9aef4ad2687bd49764815
SHA1861c9403f0c08810e20a749cafaf391c59340e47
SHA2560295a9843c4e339d9538fabb6539c8ae250c303f31e717d6311279bb04763a5a
SHA512d0d51a5349e109f61968728f26ae23be49c36d9603cf1c9fd7589080a412790ab158c083702a264d7362e806156c8a0097806a7c152d29211c2802a0f41017d6
-
Filesize
96KB
MD537e4711345260ca42d1ce37748535aa1
SHA10c326d63cc62aae3a4300bc55c478e000a01d51e
SHA256619ccc17251afac018146c6425e99ec3e22128ff276412d7332a81cc3b77ea71
SHA512ad9152dbc3a975182818a8af3b7e453d76a6351e0b24d730745cd86b14021b69603be2ead4d8c6c053c5bd42c3ad07d6a5e4609253ef1539c935ec1f4cfb98f3
-
Filesize
96KB
MD54258add3cdeab9daec60ff843f881028
SHA14d1faafd0cea04cef76b42961a4195c3ad99adcc
SHA25643f204365e01c72c8e5d93680e2faae6556e070812cef5353efbf9ab20832cb9
SHA512ced99bb839a91e5e28aa8ed61f7aa502a743cf5258b0cf4c625d1a5e74f83371cccc16ecc0cf4608c14cabc2c49c119020f33609302b1c0617da9a06d711fabf