Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 05:04

General

  • Target

    f0c62d33f25bf03a9667710cb1b003b173b2c29b561091bdcd50101804c5ff92.exe

  • Size

    96KB

  • MD5

    dbe78fc904813276bd4c89033daa55c6

  • SHA1

    5cb9e09a64db7bf66ce54727f7973a4f0516a819

  • SHA256

    f0c62d33f25bf03a9667710cb1b003b173b2c29b561091bdcd50101804c5ff92

  • SHA512

    89beb1405b51bd5596886695f5cc12c5ae9304dcdd6092ce1b49cb94599db0ac6c19e19c4cf54a1c543dbd66c0048ac254909079b7fb8fe43f2afd57b964a453

  • SSDEEP

    3072:QgR8iBAlmUTKcML/gk4SvYn5OmHSCMyELiAHONd+:QgqiBAlmeMrgdSvuYmHSbBum

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 34 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 17 IoCs
  • Drops file in System32 directory 51 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 54 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0c62d33f25bf03a9667710cb1b003b173b2c29b561091bdcd50101804c5ff92.exe
    "C:\Users\Admin\AppData\Local\Temp\f0c62d33f25bf03a9667710cb1b003b173b2c29b561091bdcd50101804c5ff92.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Windows\SysWOW64\Cnkplejl.exe
      C:\Windows\system32\Cnkplejl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Windows\SysWOW64\Ceehho32.exe
        C:\Windows\system32\Ceehho32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\Chcddk32.exe
          C:\Windows\system32\Chcddk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\Cjbpaf32.exe
            C:\Windows\system32\Cjbpaf32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:240
            • C:\Windows\SysWOW64\Cnnlaehj.exe
              C:\Windows\system32\Cnnlaehj.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3636
              • C:\Windows\SysWOW64\Dhfajjoj.exe
                C:\Windows\system32\Dhfajjoj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1016
                • C:\Windows\SysWOW64\Dmcibama.exe
                  C:\Windows\system32\Dmcibama.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1840
                  • C:\Windows\SysWOW64\Dejacond.exe
                    C:\Windows\system32\Dejacond.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4992
                    • C:\Windows\SysWOW64\Dfknkg32.exe
                      C:\Windows\system32\Dfknkg32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1252
                      • C:\Windows\SysWOW64\Dmefhako.exe
                        C:\Windows\system32\Dmefhako.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1032
                        • C:\Windows\SysWOW64\Dfnjafap.exe
                          C:\Windows\system32\Dfnjafap.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4964
                          • C:\Windows\SysWOW64\Dmgbnq32.exe
                            C:\Windows\system32\Dmgbnq32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2688
                            • C:\Windows\SysWOW64\Daconoae.exe
                              C:\Windows\system32\Daconoae.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2180
                              • C:\Windows\SysWOW64\Dkkcge32.exe
                                C:\Windows\system32\Dkkcge32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4564
                                • C:\Windows\SysWOW64\Daekdooc.exe
                                  C:\Windows\system32\Daekdooc.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4196
                                  • C:\Windows\SysWOW64\Dhocqigp.exe
                                    C:\Windows\system32\Dhocqigp.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:4744
                                    • C:\Windows\SysWOW64\Dmllipeg.exe
                                      C:\Windows\system32\Dmllipeg.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:3824
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 416
                                        19⤵
                                        • Program crash
                                        PID:1628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3824 -ip 3824
    1⤵
      PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ceehho32.exe

      Filesize

      96KB

      MD5

      310e33d77ed2fb752ac89af1e19a2b40

      SHA1

      dc256a13af3a90ea7cc745334bcaad8ba91e713b

      SHA256

      c73495c22b5ce94517adcaea7907886fe35cca7e3cb3aa768a8a3daaf038bd06

      SHA512

      0953c260a753b8019363f92f9096d8259f00e3b640a098e97d21b57fd70e25b8cefdb920afca7556e32f176e458ca526eb83eb46c74825ad231262cda6fbf3ed

    • C:\Windows\SysWOW64\Chcddk32.exe

      Filesize

      96KB

      MD5

      d412a6aff647ad6ed524ba2f4606df6d

      SHA1

      78ff6af8cb2ac8af3296ef225e25688b4e92461c

      SHA256

      2f3fa7d720d7fe766c2cfdd7f6b70610c10e0109d010ee8c6fa8e359e4757112

      SHA512

      97a375c1645e79f49c8d8ab699f97e9be94d18e83ae5fa85f81ef91c0b9f53bb94b5cb31e446c3e2b9c92dcb31208f64f0d5a2f84628b23dd375992374136318

    • C:\Windows\SysWOW64\Cjbpaf32.exe

      Filesize

      96KB

      MD5

      64b34fc3a8eaf6d4ea539873431bd243

      SHA1

      ebcafb276358b3e2b7cb55bcaaa5dd7468fea906

      SHA256

      d66806da484d4acca3666913c2eb44c7047ef45ba049ed5bd20a5ac93ac8a035

      SHA512

      b81228ae5d321e4cf92cf162090560ecdafdde4eed09509b261b513426467b629f38b1d7cf105b9b054bff7fabc91b4da050e8b12c0c5a2cbc4d35632c58521d

    • C:\Windows\SysWOW64\Cnkplejl.exe

      Filesize

      96KB

      MD5

      44d8df669d8cd521ee715c6fec58200e

      SHA1

      0ee9ae10fa171f4916b55fe63b63470494db2e64

      SHA256

      9e1ef59a24266261788f0dbb7bd4635737877dd2337f06e96d81b56e94c978d6

      SHA512

      9497c57a51691332b9b0d719b47b2bfacc4018d05adb5bca83319a746268eb27d5e8954c94508769e2f0617c19ec071ff4a19fd88c60ec5dcf01356a483ed0cc

    • C:\Windows\SysWOW64\Cnnlaehj.exe

      Filesize

      96KB

      MD5

      461ad35178e6e1438857154a7deadd74

      SHA1

      cfb837e66d61b768d9db634577603512eb898913

      SHA256

      835bde63b5d85fba362a6e5ae1a8bf466a98166e772f72460af5e33e75d167d6

      SHA512

      f9b6259c58106be334c1ff0e86624c5806570dc7332a585aeb48d11d019c91054d62f1efe022995e72b9d551d62eae58fc56a1eff6c7c435951794177d0b03d4

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      96KB

      MD5

      a9beb5bbbe415dcab4e7899ce9e1750e

      SHA1

      7efa960823cd71cf080b4c6923ce8a796bc3ce8a

      SHA256

      345b8c0b465ae3e28b861db832f9a01fc07aeed30c2c201a327e385af9d71e3c

      SHA512

      699ea2de8220bd8a4778be7f621b0897253abb6d75742e3238218823af0f3d83c845e4f4db881e024d2a66efbdf5c4df0c053322e0c29ae2c6f8a7a5c2b539b3

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      96KB

      MD5

      144dcf934a8e100dcd87d21036097bb0

      SHA1

      3ff0edc74a8933c10b00ad5d610663adae0880b6

      SHA256

      14f461e4554563f958eee7d8ab0089c72dbbe90bed38f4cdd80d6d7296e8a888

      SHA512

      a13dad87fb54b2eae949023f345ba014ba078c190799cc6a3b6bc3bf5cc79650d500a654994928372949145983d5b6ae3c6df19034b5eb6819620cdd951b38c7

    • C:\Windows\SysWOW64\Dejacond.exe

      Filesize

      96KB

      MD5

      e1340269529c1120550fbf104d77189c

      SHA1

      992ea8d721f54300ac647f4a955b9069b7172cb2

      SHA256

      94f3d24ec3a808fbf00ffb4e8da3bc8e5a854e41747c29e4c15631084985d665

      SHA512

      d3ec2f57ba0f42af207b5578eda74b14a163c5881cf86039b43d234d2a209c0f2fa1b2290b8b9a67c90247c33b27fb745055bd30f83628a53821fbc53be23211

    • C:\Windows\SysWOW64\Dfknkg32.exe

      Filesize

      96KB

      MD5

      ae0172b93d381be21d5817463a4c0f25

      SHA1

      f6a22221eab1818fe725dd07236c633238196a22

      SHA256

      08c266b005cef176de1446b523b3457bd864884ff279884e76d0893547d68843

      SHA512

      bb1fa89a48ba224c1689c80b0c1abb09d9453dcf084ebcd007c6ca5cbfaa31cc46ed12717c54219348cedc8374208d5ab6796028739096059cc4748b98be25dd

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      96KB

      MD5

      2b4c6ae52a0d038a3dd0727b7f538390

      SHA1

      b50887f417151163326c1217f28169faf75191ae

      SHA256

      92ac546c13c116871fa26ec88b7e2f07e98856152db15d3046d304c6d9cfd39a

      SHA512

      371debb86de5b2cd1f00a14973bfe55db79b6e7a5b9ffbbbd4d2a0bba823e4a77f934e530fc51ab24c732790ec8a3c577aeed5605db4ba32addaae2a1d5d031d

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      96KB

      MD5

      2f5603bf04031cb17ddaa34504402273

      SHA1

      0cdfd470ad76bb879f62b6f2655faba4a361414d

      SHA256

      293a9cd7a98d74cf09ca1eb9760907f0fc490c33ce6579f5e4255496e355842a

      SHA512

      a9e538a3940f3ed42775eab10f2e6e59d0b577b34896e466e9eb1a6b3cf1c48b4109482baec21d7a050393ebc3cc7a7d2a21c4437c381bc8fe423b0911806a42

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      96KB

      MD5

      058b8818be23fb05ce6f5c8d45b1cf6c

      SHA1

      d0acfd539c5cf9e17450dc23cb096c8900c2b35e

      SHA256

      b6d1a96129e41d17ddc7a70026899633cc67229ec6ba3904f4b4a1c963b1647c

      SHA512

      375b464938de8877236fb51febe8d121e85688216d709541d21cf20e653ebf4e5539880eb9309a0b7834a213fd64d2b6cefda1411232fe34263d5d7fb97e494c

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      96KB

      MD5

      141d46c61ffa6af8ed154607d434d825

      SHA1

      620df58a87b1700c49a6883a76447d7bda510c2f

      SHA256

      c806e8e40463492596ecb4155795101fc4c138154c834ec4e201eca8e83452c2

      SHA512

      abf437f5b7a77becaf413d31f72f6b87fb703eb3a54c2a2f38da7db778ea6a72d12bc32e33e3cf141d7b37da455563f35a05c47f79bd9c619767df1f645ea264

    • C:\Windows\SysWOW64\Dmcibama.exe

      Filesize

      96KB

      MD5

      a3a1a6906356d272f0e56ec5c1872de6

      SHA1

      4e2d80a0299f545fc40ae9b42f1b68fb5a8836f2

      SHA256

      9916eec8cf05d302e134c377efa734d43a7f38c437b7fc71fcf66df4e38e13e8

      SHA512

      1fc104b04d17acf17267de11ad30f459ccec134ffa70adb1882d40c355062b6b4af80ecc2d0c5455dca47f54fdde8797c5bb6d2eb8688af287f1dc18923a4036

    • C:\Windows\SysWOW64\Dmefhako.exe

      Filesize

      96KB

      MD5

      047835c4cd2da6617b8bf88323b86d3f

      SHA1

      65faffedb1904861551d08c40050db98358a8727

      SHA256

      f9f702e50314c7451a5a6747d6118c74c6aa127616b2caa5504428ed5fb11fa4

      SHA512

      0c172bd19725b255ca27559c889c1661d308cfdd015acd0d9b5de43ac604d33b105ac5be3ec88d43325aca30779394d9b705a0db91eed19f13c46712613f84d4

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      96KB

      MD5

      0870cb9e8b2777e4c14322bc54b22df8

      SHA1

      7ec8adb8889aab7c487b78c9a19fc2ee51f61d47

      SHA256

      29039916ef65af4d322b0fad50d38510c7db3e6b09b975ea8278fc351c33eddd

      SHA512

      da9887800a00d3895cae49648d5a815adf8d32f0629d4fa039ed2eacec85f09a5025f1fd0d873c147b538745c9628a20a2b7da77495c3f92aef32b228c4055b1

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      96KB

      MD5

      9fd078c03450b23cc5c85d2b0c13fdd4

      SHA1

      035734f7172a44362c152ec403e8ada4135f7253

      SHA256

      9b9e3a1be23204298828f89cb45fa44388115e4fe4eab91ceccfbb7afb56c900

      SHA512

      f230f58580701912296a8c2a62b74bf133f0b4d3d2c1d470d454b2d8d2b0d2357d49e6ee371bb6c6f3d550062df33700f08b546efb8df33b3d009722770fb812

    • C:\Windows\SysWOW64\Ingfla32.dll

      Filesize

      7KB

      MD5

      412f684df206cda650a2fff4c63797b6

      SHA1

      90c5168f22e01ee34c5147ab86b83dcec17ce442

      SHA256

      27da81543ce0ca2e470bfd4b9639d6d747cddd8561f539304ed2d3433160e664

      SHA512

      35acbfd5698a6be60fd36161d01efe396e2ed44440fb5968f2a8b41a805d0a77c1319d4301bb9524d47b2affe3221584c493fcb0728b30bae554ba84c94e02fe

    • memory/240-36-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1016-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1016-47-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1032-80-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1032-152-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1252-153-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1252-71-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1840-55-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1840-141-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2180-148-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2180-108-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2552-15-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2552-98-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2688-150-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2688-99-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3512-107-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3512-28-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3556-7-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3556-88-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3636-39-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3636-123-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3824-143-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3824-145-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4196-147-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4196-124-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4564-116-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4564-149-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4676-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4676-79-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4744-146-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4744-134-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4964-90-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4964-151-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4992-63-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4992-144-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB