Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 08:06

General

  • Target

    e5a5f58c950b516529ba4a366ea3b429ae3452c50bbea4f0ea0b55de66672679N.exe

  • Size

    57KB

  • MD5

    5b9c6915ece8933a3100b442b3e28f60

  • SHA1

    9b8e88133fc4e271176cb8d47267d5d37e3ab7ec

  • SHA256

    e5a5f58c950b516529ba4a366ea3b429ae3452c50bbea4f0ea0b55de66672679

  • SHA512

    785b1763f12d6e820d804abe7136160caec131609e3824589fb529a94736e379ecc3d75e74f8220593960ca6bdede1490203923cad65e6e6e561defa0dca3deb

  • SSDEEP

    1536:P0fwTr8kSmia91Sf8/z9VK0DowHAPdYWrU:8fwTAkSmiSL/pI08wHUg

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 25 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5a5f58c950b516529ba4a366ea3b429ae3452c50bbea4f0ea0b55de66672679N.exe
    "C:\Users\Admin\AppData\Local\Temp\e5a5f58c950b516529ba4a366ea3b429ae3452c50bbea4f0ea0b55de66672679N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\SysWOW64\Kdnkdmec.exe
      C:\Windows\system32\Kdnkdmec.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\Khjgel32.exe
        C:\Windows\system32\Khjgel32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\SysWOW64\Kocpbfei.exe
          C:\Windows\system32\Kocpbfei.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1332
          • C:\Windows\SysWOW64\Kfodfh32.exe
            C:\Windows\system32\Kfodfh32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Windows\SysWOW64\Kadica32.exe
              C:\Windows\system32\Kadica32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2728
              • C:\Windows\SysWOW64\Kkmmlgik.exe
                C:\Windows\system32\Kkmmlgik.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1224
                • C:\Windows\SysWOW64\Kipmhc32.exe
                  C:\Windows\system32\Kipmhc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1956
                  • C:\Windows\SysWOW64\Kgcnahoo.exe
                    C:\Windows\system32\Kgcnahoo.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1272
                    • C:\Windows\SysWOW64\Lmmfnb32.exe
                      C:\Windows\system32\Lmmfnb32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:588
                      • C:\Windows\SysWOW64\Lbjofi32.exe
                        C:\Windows\system32\Lbjofi32.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:280
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 140
                          12⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Khjgel32.exe

    Filesize

    57KB

    MD5

    da82803e87d54f18abbc802963da98b8

    SHA1

    871ef9aa2aa81013b13f1a37c9fd96d660d663fd

    SHA256

    86e855cb9b23a23a1ef7aec86787b4fecd9b5d9a0db4a967abfa9492a0127b17

    SHA512

    4e63fe5417ecf25b32772fa96fed968e21d1b1aa0ce88f336e0b6b6666a266aca91fb20802b46699e4375f59eb80e0dc224df77b36edbe761fa45f01f6c8912d

  • C:\Windows\SysWOW64\Kipmhc32.exe

    Filesize

    57KB

    MD5

    71aec19e881b35392a4f3f357d916a9d

    SHA1

    9c8ac03e2ef75c85007f3f6ddd9f3512bb155dd2

    SHA256

    f528a806b5f35ac32ba7725fae5e9451b61343f5f6dfae83ea4a57e4292d1325

    SHA512

    b078c3a79513e627c0fb5fe36c6ea30fdfe8592c0d5659a68fdb997d71f0c9f7d6547ed180bdec596fe83bfd9af96e8a959a6e4da5468798c5b2a8bda9fa5c33

  • C:\Windows\SysWOW64\Kkmmlgik.exe

    Filesize

    57KB

    MD5

    fd0747fe440667f672cbc95c3fc56700

    SHA1

    ae03c04bfbee9976cf6a75e0059e6da923c707f2

    SHA256

    733a70628dc8ebd9e6b377b1d8dba9fb7ab119614f6fc606936ac983c85ee08d

    SHA512

    cbe8b8de668a99d990889315a7490f1a1b9cec7c69c6656336540eaebb324e343480585df9f89436e2a977a3e5ff5800d431434993e58b4dce950852954beacd

  • C:\Windows\SysWOW64\Kocpbfei.exe

    Filesize

    57KB

    MD5

    7287ed8eea44b3ce98b19168d9a2be21

    SHA1

    9ed9089836eb6ee3b8f58a17b96710260a00ce8c

    SHA256

    e37142f25b0a445ae56a00e9f3bf48880077d66a18f28a29b0e85037ece42e39

    SHA512

    b46e77007d51d8402268043ebdae7d57a0de2a194cd1e4f24f6ef7827cfc6232632f41a30d80faabf9b12e0a4f4f3d596701c3de31b072c222608d2d37f4beef

  • C:\Windows\SysWOW64\Lmmfnb32.exe

    Filesize

    57KB

    MD5

    b0cdb6a4680d416950178a9db95d3069

    SHA1

    5cb28da6c3e92d8002446fc52cbf201ae3a05a2f

    SHA256

    36af08233259fdd60dce2a0f1a8a3b548e1d57c72ae309407a6c2b7402bdf485

    SHA512

    0fccd0f0db4b87ddea4a7421675262dfee0842c9e315db956c4d0f664e2f74455bef8fd87b8193051cfba0a3a844e7801879d4bb2a1dc88b279907c4ddce8c87

  • \Windows\SysWOW64\Kadica32.exe

    Filesize

    57KB

    MD5

    0771cb1b71e8064fb73b298042e4c52d

    SHA1

    4086dab1374761d01c5ab8f3547baf412e37692d

    SHA256

    3e21bac79babbb403312d62bac63dbd8b3e78f8277e73f58d65c7ce612756485

    SHA512

    dc7fac7f9e24838fe4093142ccee24d4a4dfb4f5cd57de87b865f086f5064b509398f9f172dd9b226aa2bb37bc4bd23060d97dd23dbf0e43275661d504740df3

  • \Windows\SysWOW64\Kdnkdmec.exe

    Filesize

    57KB

    MD5

    6a289342caeb7c6458a704ba25fde8e7

    SHA1

    1501b1ed26b0c91cc843d09a2a7c8c98a6b57ecb

    SHA256

    aced5220e2a4c8321f4213b6b8bb005042e548691f7e9c8e951b4fb183bd0006

    SHA512

    565d940464d74a568ed8e05b16ec5491a0b013816afbfeeceefd65e1217940963d8ed88983900b7bb595d4b39bbe838cd54e757913894ba881c2e6ed14e6d44a

  • \Windows\SysWOW64\Kfodfh32.exe

    Filesize

    57KB

    MD5

    59efcb5feecd7e6db0d21470d87462fc

    SHA1

    0abd8ba823e874b4eb36347ded5da93459aaa919

    SHA256

    70084b9dbd43ab7ff49b862012038c8120b7d404ad99d31190a8a8d65820ffe7

    SHA512

    e5120e878cdb2f45695cd5128ab8a565a57298d4f64e9aecc021b8948db9a21fec39bc12807110fcc7afdbaa75b1b3ed486195d09617e1960b1438ab883793f2

  • \Windows\SysWOW64\Kgcnahoo.exe

    Filesize

    57KB

    MD5

    dba0ab523015da310a8fa0e5552fa038

    SHA1

    b1f06c892433fda7f1cb299dddd025675c40fb71

    SHA256

    6eb8aa81ec2aaab445ad26c38eabb2bd98c23042b78cdc60ffb43a6934e558ad

    SHA512

    1d5bac3ef9ae68acf9b8330c50708a2a5c8037743568edef9f618badc9bdc98ba75d9042b0b9a0803bf1856696a477f78a0518813ad9a74e12c0a5047ec79730

  • \Windows\SysWOW64\Lbjofi32.exe

    Filesize

    57KB

    MD5

    4926aebddb0ea5fe207fbcf63339f6be

    SHA1

    35b4601492ea47db0c40edcebe82f715beb5eed9

    SHA256

    6e13e001075e1b1266bbf4192da36609a7af8fe66316aff34ab665b4877e565c

    SHA512

    e65a73733fcb141abf9df5783598c622ef4e9be95340875af50f2648b88a940a129aede7db956a87c75a42563aa16657819e5a96f9859e95a5c2d9bc6175844b

  • memory/280-137-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/588-123-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/588-147-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/588-131-0x0000000001F40000-0x0000000001F75000-memory.dmp

    Filesize

    212KB

  • memory/1180-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1180-148-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1180-17-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1180-18-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1224-88-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1224-144-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1272-115-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1332-149-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1332-48-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1332-41-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1956-96-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1956-104-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1956-143-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2236-33-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2700-68-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2700-55-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2700-146-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2728-77-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/2728-69-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2728-145-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2796-32-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2796-19-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB