Analysis
-
max time kernel
73s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:47
Behavioral task
behavioral1
Sample
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe
Resource
win10v2004-20241007-en
General
-
Target
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe
-
Size
192KB
-
MD5
4098d005b1f711e6eab197d727362dc5
-
SHA1
fc8c3960f29639022795a6e90d24e1920c1fe753
-
SHA256
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b
-
SHA512
ce63f23df1464fa3875e3a5a8f279641ec241bdd417e8ebbcf9be31a2c14b37e81e733706a9d9509c3e8919b28dfc14224138c1d85ad165695b4781fa5d84ee9
-
SSDEEP
3072:5cNfLE24ho1mtye3lFDrFDHZtO8jJkiUi8ChpBhx5Zd424hoc:5OLpsFj5tPNki9HZdc
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccjoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccjoli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdgic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe -
Berbew family
-
Executes dropped EXE 3 IoCs
Processes:
Ccjoli32.exeDjdgic32.exeDpapaj32.exepid process 2852 Ccjoli32.exe 2568 Djdgic32.exe 2912 Dpapaj32.exe -
Loads dropped DLL 9 IoCs
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exeWerFault.exepid process 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe 2852 Ccjoli32.exe 2852 Ccjoli32.exe 2568 Djdgic32.exe 2568 Djdgic32.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe -
Drops file in System32 directory 9 IoCs
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ccjoli32.exe b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe File created C:\Windows\SysWOW64\Ciohdhad.dll b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe File created C:\Windows\SysWOW64\Djdgic32.exe Ccjoli32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Djdgic32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Djdgic32.exe File created C:\Windows\SysWOW64\Ccjoli32.exe b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe File opened for modification C:\Windows\SysWOW64\Djdgic32.exe Ccjoli32.exe File created C:\Windows\SysWOW64\Ccofjipn.dll Ccjoli32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Djdgic32.exe -
Drops file in Windows directory 2 IoCs
Processes:
Dpapaj32.exedescription ioc process File created C:\Windows\system32†Dhhhbg32.¿xe Dpapaj32.exe File opened for modification C:\Windows\system32†Dhhhbg32.¿xe Dpapaj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2076 2912 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exeDpapaj32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccjoli32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdgic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe -
Modifies registry class 12 IoCs
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccofjipn.dll" Ccjoli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djdgic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciohdhad.dll" b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccjoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccjoli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exeCcjoli32.exeDjdgic32.exeDpapaj32.exedescription pid process target process PID 2708 wrote to memory of 2852 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Ccjoli32.exe PID 2708 wrote to memory of 2852 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Ccjoli32.exe PID 2708 wrote to memory of 2852 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Ccjoli32.exe PID 2708 wrote to memory of 2852 2708 b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe Ccjoli32.exe PID 2852 wrote to memory of 2568 2852 Ccjoli32.exe Djdgic32.exe PID 2852 wrote to memory of 2568 2852 Ccjoli32.exe Djdgic32.exe PID 2852 wrote to memory of 2568 2852 Ccjoli32.exe Djdgic32.exe PID 2852 wrote to memory of 2568 2852 Ccjoli32.exe Djdgic32.exe PID 2568 wrote to memory of 2912 2568 Djdgic32.exe Dpapaj32.exe PID 2568 wrote to memory of 2912 2568 Djdgic32.exe Dpapaj32.exe PID 2568 wrote to memory of 2912 2568 Djdgic32.exe Dpapaj32.exe PID 2568 wrote to memory of 2912 2568 Djdgic32.exe Dpapaj32.exe PID 2912 wrote to memory of 2076 2912 Dpapaj32.exe WerFault.exe PID 2912 wrote to memory of 2076 2912 Dpapaj32.exe WerFault.exe PID 2912 wrote to memory of 2076 2912 Dpapaj32.exe WerFault.exe PID 2912 wrote to memory of 2076 2912 Dpapaj32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe"C:\Users\Admin\AppData\Local\Temp\b32883de9563d0e41569f9f175fcf18ed77d3be071b5d628088bec89eacccd7b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Ccjoli32.exeC:\Windows\system32\Ccjoli32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Djdgic32.exeC:\Windows\system32\Djdgic32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1445⤵
- Loads dropped DLL
- Program crash
PID:2076
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD54495f9ea4b2622dffc1d2982637f434a
SHA18d835d02244fc89b0daa149ee1ca4a260f07832f
SHA256048e2ba1fec6b2acde617610d011cffb344b83f9b86e3453fb078f2479f3dd5a
SHA512e5766c74d0e2575862bb2ff8de3c4930ba8798f82319b05d6df15b50750e268771292903068b6f50b5ca8284b136b64220075470e726f75b0ab2c41b0f4537f5
-
Filesize
192KB
MD5d4c7dcf0bb69143d7d6e38958db95197
SHA11bbc11c48e8d04ffd2ea96cc0a4a8c8b55ad0dc9
SHA2569117e2683ae09b77604eab59ecf6436bab5e64cfe1a7567de7eb9fcfc1c45d70
SHA512094ae75f9402636c08cbe42417d4d4b567f2469c45841f6ff06c8720c2e610f3d3e34924219ba553efb5deca5d5871550a8bf9571b38579a9ebd35364544423e
-
Filesize
192KB
MD597ace74562215a705f4ca302d4772c38
SHA125ae91971c94a90313c11bbedd34560d8894f72a
SHA256a06e0ec20e44015999f205b54ee61fedbe90bc9e8a3b35a08c518b663d2613d7
SHA5128c8972d6e49a1ebc19073aaa094cfa2607fdd85862fb1e45dbb4fe618bef8dd98644c779fdd085e958d1e71e83eba77854f96398bca37f541beb3ca36a469903