Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe
Resource
win10v2004-20241007-en
General
-
Target
a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe
-
Size
92KB
-
MD5
552d8bb79b792c78e821c1ac2cfc1f80
-
SHA1
2882b0b1958e1c531e92df54c73f929b21becbac
-
SHA256
a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198
-
SHA512
1c43861a7c2653f4da1d0ef75ece3bd6f5e2a4f85485c1433c1038c2cdd19f26e00c0e6bb17a22cf1154a46a2f396f6ce85be0404b6f851c94a1b65a7315051b
-
SSDEEP
1536:OXEq82JQ8zdLj6APuHX9HzT7Qd9OyPFC/DQ6d+LdN3imnunGP+W:Wt8EV6AP+XBTQtPF8ydVbe4+W
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe -
Berbew family
-
Executes dropped EXE 2 IoCs
pid Process 4136 Dddhpjof.exe 3112 Dmllipeg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Dddhpjof.exe a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe File created C:\Windows\SysWOW64\Amjknl32.dll a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1380 3112 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4136 2260 a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe 85 PID 2260 wrote to memory of 4136 2260 a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe 85 PID 2260 wrote to memory of 4136 2260 a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe 85 PID 4136 wrote to memory of 3112 4136 Dddhpjof.exe 86 PID 4136 wrote to memory of 3112 4136 Dddhpjof.exe 86 PID 4136 wrote to memory of 3112 4136 Dddhpjof.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe"C:\Users\Admin\AppData\Local\Temp\a804cb1666db7e6a2c840eaf738cd71f6ecf8f2b950ec47b491146f8b90fb198N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 4084⤵
- Program crash
PID:1380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3112 -ip 31121⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52c98ef441adc6983c418907e7c9a7b44
SHA11e65c9aecd094ca44a1c9e3660ec6c2ac4077e09
SHA256b0a86641292194fa73322c5a786a8a0637f9d172c40f9140acfb2140d2afeb87
SHA512a4033255d0428ce84f9a9be585017b3c79d6d67c5ea9aa5ebef4b59edfb52af60532b1341903b1e04415c9941a45b7498d62eeaf761d38d518d66f2c8ee95c17
-
Filesize
92KB
MD5c77b1426de1d17e586ab7c7dc7e0341b
SHA13fdb577bd3f8eb5d08f39e935fc1e18bdc1ee73c
SHA2562259551fcf9a2e15a94da4727d1c835c392f69a161a3fe3782357d1a0e9f7b66
SHA512746bbf77efea413aa159f26eaada8a4f68007ec1f64e407d048e55c59c10b9f95a07cbb2ff44b600b914f13dd8157fefe4b70e97bf800d7d249d284ce0b13eda