Analysis
-
max time kernel
93s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe
Resource
win10v2004-20241007-en
General
-
Target
ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe
-
Size
74KB
-
MD5
d3e81a92ab6817c5290b99118cffc7a3
-
SHA1
3655a3bf5e7eb338c2871fd38bfbece4024dd265
-
SHA256
ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247
-
SHA512
865ec94780f8a18ea801423928d605b42c180273ba728a0ee91594c8dc0ffcd6052db543fcaf40e97eb12d4c1b26a88ed6c366565254de38b2933d6d70aa4773
-
SSDEEP
1536:IARkLHw+8eQtAUtYfrZ7r8UDx7Zz5HpUsWr+IvbRS:TRVtAr9r8yxFz5EyIvFS
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 4700 Dmllipeg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe File created C:\Windows\SysWOW64\Kngpec32.dll ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3296 4700 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4700 1268 ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe 83 PID 1268 wrote to memory of 4700 1268 ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe 83 PID 1268 wrote to memory of 4700 1268 ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe"C:\Users\Admin\AppData\Local\Temp\ea2e750027d25804716945b4fbd1726d1a95dc7164032cd2a24056e6b6279247.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 4083⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4700 -ip 47001⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD541fc0dafb7a34fc34be835484b658e68
SHA195c8920958721e3ed24d2b02075c5d17909eb418
SHA2561f7416bf1c755c018d62f036df1ef6c0e208a8ebaaf1b7019704ef0fd26747ea
SHA512652706875334016c332945ba477f7ca2bb9dc55f67b7266043659871893f2fd0f6bc9e918fbfa8fa981d294d3180ef5dddc7bb00242775b780f6dce330e713dc