Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 19:46
Behavioral task
behavioral1
Sample
f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe
Resource
win7-20241023-en
General
-
Target
f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe
-
Size
93KB
-
MD5
9ea7ee7910897e23fa1817feeaf2f840
-
SHA1
6bac7c1a4d93fab9456184d83526dfdcaf9f7bb3
-
SHA256
f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22
-
SHA512
89198530cf9e8e70bbb6a88171e7ff0c1afa5e683a6835a60c43c320b0aa9192e24a5f18d0c4bd5b09ac3037c8ac4a0f680019d4a6644c79b162825389d81660
-
SSDEEP
1536:LJNP4pNKP2+TdhVvqIIDtWZy9y1Yinczc7n1DaYfMZRWuLsV+1Z:LTk8RdryIIRuYinT7gYfc0DV+1Z
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhhpeafc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bobhal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bobhal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmeimhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmeimhdj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpfaocal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpfaocal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cddjebgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cddjebgb.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 6 IoCs
pid Process 2816 Bhhpeafc.exe 2944 Bobhal32.exe 2772 Bmeimhdj.exe 2724 Cpfaocal.exe 2112 Cddjebgb.exe 2872 Ceegmj32.exe -
Loads dropped DLL 16 IoCs
pid Process 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 2816 Bhhpeafc.exe 2816 Bhhpeafc.exe 2944 Bobhal32.exe 2944 Bobhal32.exe 2772 Bmeimhdj.exe 2772 Bmeimhdj.exe 2724 Cpfaocal.exe 2724 Cpfaocal.exe 2112 Cddjebgb.exe 2112 Cddjebgb.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cddjebgb.exe Cpfaocal.exe File opened for modification C:\Windows\SysWOW64\Cddjebgb.exe Cpfaocal.exe File created C:\Windows\SysWOW64\Ceegmj32.exe Cddjebgb.exe File created C:\Windows\SysWOW64\Jodjlm32.dll f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe File opened for modification C:\Windows\SysWOW64\Bmeimhdj.exe Bobhal32.exe File created C:\Windows\SysWOW64\Oimbjlde.dll Bobhal32.exe File created C:\Windows\SysWOW64\Bhdmagqq.dll Cpfaocal.exe File created C:\Windows\SysWOW64\Bhhpeafc.exe f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe File created C:\Windows\SysWOW64\Imklkg32.dll Bhhpeafc.exe File opened for modification C:\Windows\SysWOW64\Cpfaocal.exe Bmeimhdj.exe File opened for modification C:\Windows\SysWOW64\Ceegmj32.exe Cddjebgb.exe File created C:\Windows\SysWOW64\Aoogfhfp.dll Cddjebgb.exe File opened for modification C:\Windows\SysWOW64\Bobhal32.exe Bhhpeafc.exe File created C:\Windows\SysWOW64\Bmeimhdj.exe Bobhal32.exe File created C:\Windows\SysWOW64\Dqcngnae.dll Bmeimhdj.exe File opened for modification C:\Windows\SysWOW64\Bhhpeafc.exe f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe File created C:\Windows\SysWOW64\Bobhal32.exe Bhhpeafc.exe File created C:\Windows\SysWOW64\Cpfaocal.exe Bmeimhdj.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2872 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmeimhdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpfaocal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cddjebgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceegmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhhpeafc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bobhal32.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqcngnae.dll" Bmeimhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmeimhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoogfhfp.dll" Cddjebgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodjlm32.dll" f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imklkg32.dll" Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bobhal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhdmagqq.dll" Cpfaocal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bobhal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oimbjlde.dll" Bobhal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cddjebgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cddjebgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmeimhdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpfaocal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpfaocal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2816 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 30 PID 2952 wrote to memory of 2816 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 30 PID 2952 wrote to memory of 2816 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 30 PID 2952 wrote to memory of 2816 2952 f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe 30 PID 2816 wrote to memory of 2944 2816 Bhhpeafc.exe 31 PID 2816 wrote to memory of 2944 2816 Bhhpeafc.exe 31 PID 2816 wrote to memory of 2944 2816 Bhhpeafc.exe 31 PID 2816 wrote to memory of 2944 2816 Bhhpeafc.exe 31 PID 2944 wrote to memory of 2772 2944 Bobhal32.exe 32 PID 2944 wrote to memory of 2772 2944 Bobhal32.exe 32 PID 2944 wrote to memory of 2772 2944 Bobhal32.exe 32 PID 2944 wrote to memory of 2772 2944 Bobhal32.exe 32 PID 2772 wrote to memory of 2724 2772 Bmeimhdj.exe 33 PID 2772 wrote to memory of 2724 2772 Bmeimhdj.exe 33 PID 2772 wrote to memory of 2724 2772 Bmeimhdj.exe 33 PID 2772 wrote to memory of 2724 2772 Bmeimhdj.exe 33 PID 2724 wrote to memory of 2112 2724 Cpfaocal.exe 34 PID 2724 wrote to memory of 2112 2724 Cpfaocal.exe 34 PID 2724 wrote to memory of 2112 2724 Cpfaocal.exe 34 PID 2724 wrote to memory of 2112 2724 Cpfaocal.exe 34 PID 2112 wrote to memory of 2872 2112 Cddjebgb.exe 35 PID 2112 wrote to memory of 2872 2112 Cddjebgb.exe 35 PID 2112 wrote to memory of 2872 2112 Cddjebgb.exe 35 PID 2112 wrote to memory of 2872 2112 Cddjebgb.exe 35 PID 2872 wrote to memory of 2700 2872 Ceegmj32.exe 36 PID 2872 wrote to memory of 2700 2872 Ceegmj32.exe 36 PID 2872 wrote to memory of 2700 2872 Ceegmj32.exe 36 PID 2872 wrote to memory of 2700 2872 Ceegmj32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe"C:\Users\Admin\AppData\Local\Temp\f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Bhhpeafc.exeC:\Windows\system32\Bhhpeafc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Bobhal32.exeC:\Windows\system32\Bobhal32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Bmeimhdj.exeC:\Windows\system32\Bmeimhdj.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Cpfaocal.exeC:\Windows\system32\Cpfaocal.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Cddjebgb.exeC:\Windows\system32\Cddjebgb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\Ceegmj32.exeC:\Windows\system32\Ceegmj32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2700
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5276ed2881bf3dfb73ad98803d7eca956
SHA1d2fab2abe63149e7b2de112ddf9a60bb44dd134b
SHA2564933d9bc61c97ce7831b41745437041635ff286d366eab3c8a06274c14b0936a
SHA512b9d9ae4d2603624d01558b48b0ca58934f357fd14da75f7ff272437457ff46843bde70251a1533ec6db5ce19d45a53781b6ae10364d99020f9eaee7a61ea4dc2
-
Filesize
93KB
MD521c4b849c955253dcfee8e22c9c7a177
SHA1c479fb5984f03b139a66993698dd7efed90de87b
SHA256321b9bd83abd2207db9d5de56686c52503e0cabf6e3f4a8e4d646e0a348196a8
SHA512c559ca53017a478eab2cb17d33fc41329267de9e4be57f0a5b7089116d2115dd664e44a877efe4d85cb36ab6ed83f6db40977fbcab7e0af701c41a06fa448d18
-
Filesize
93KB
MD5bb21ada94132fc9e616496ff4c89c3b2
SHA10b8b43dea2f96e81621d2958e19f638cb8f863bc
SHA256fdf126d3423b373030367c242ea742e331d74e2b08c16c1d1bff68e5a2d4590a
SHA512e7f58618c08f0c8c4bd8343bab45fb9701a02f26829140b97f1a26561e0ee95cde42355f180f8365d1ca05b096ca07fae2ab9cfbf8937b20cd6e06327692adf6
-
Filesize
93KB
MD5c332393b4251bf11c65a2ded1ec1c005
SHA177d9acd075185bf8e54117d8548425aa3f4b7d49
SHA256ffeac40d07bd6ef0036ffb54e94f97c3e8d193929c425d90eaa882ffddf48ae1
SHA512dbeaed126475dae2ab5644f313a247a23647fb8be5371c9714b5e664e6a6b02fce67dc209392f381884caceaa17c6a5f9d7d4734c994e13f3b9ea975ad0f7564
-
Filesize
93KB
MD54bb524a79d32e0976f77e7345869df2e
SHA190e37e87986b71ce362b68269dd0acec3599e9d8
SHA256d4b42472d569bfb07e7995d01da365c6d751d3492a020dd8b539d411bfb0897d
SHA512a9e74e9216460d69e68f9a8e1a0569eac507300f386bb4f3e0c09ccf71a077d2577b6129d74d91380cc0dd26f2cb1d87eaa34bbc06330f98e52a9d30610abcac
-
Filesize
93KB
MD55e82d0aed8babe6d53d29cafa00547ec
SHA195084b7b40ab758f4b4605d62326f29c92a9bdf1
SHA256d982b6df81f9f45b8e1681c265738d751a0d418ff84796a9d5d12db48d03f0f2
SHA5126f1652f34dbc49f983a6be3e77f184f69f59e6be9daadfb3cdcc29039bab062ff6f496e7d79f795a955be09c6c67acb672397153abffe136df37e42167da763b