Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2024, 19:46

General

  • Target

    f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe

  • Size

    93KB

  • MD5

    9ea7ee7910897e23fa1817feeaf2f840

  • SHA1

    6bac7c1a4d93fab9456184d83526dfdcaf9f7bb3

  • SHA256

    f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22

  • SHA512

    89198530cf9e8e70bbb6a88171e7ff0c1afa5e683a6835a60c43c320b0aa9192e24a5f18d0c4bd5b09ac3037c8ac4a0f680019d4a6644c79b162825389d81660

  • SSDEEP

    1536:LJNP4pNKP2+TdhVvqIIDtWZy9y1Yinczc7n1DaYfMZRWuLsV+1Z:LTk8RdryIIRuYinT7gYfc0DV+1Z

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0829c81d4bac245e71ff5a053330b90766986b9eca0b5a26fbba2a107a9fa22N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\Bhhpeafc.exe
      C:\Windows\system32\Bhhpeafc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\SysWOW64\Bobhal32.exe
        C:\Windows\system32\Bobhal32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\Bmeimhdj.exe
          C:\Windows\system32\Bmeimhdj.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\Cpfaocal.exe
            C:\Windows\system32\Cpfaocal.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\Cddjebgb.exe
              C:\Windows\system32\Cddjebgb.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2112
              • C:\Windows\SysWOW64\Ceegmj32.exe
                C:\Windows\system32\Ceegmj32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2872
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bhhpeafc.exe

    Filesize

    93KB

    MD5

    276ed2881bf3dfb73ad98803d7eca956

    SHA1

    d2fab2abe63149e7b2de112ddf9a60bb44dd134b

    SHA256

    4933d9bc61c97ce7831b41745437041635ff286d366eab3c8a06274c14b0936a

    SHA512

    b9d9ae4d2603624d01558b48b0ca58934f357fd14da75f7ff272437457ff46843bde70251a1533ec6db5ce19d45a53781b6ae10364d99020f9eaee7a61ea4dc2

  • \Windows\SysWOW64\Bmeimhdj.exe

    Filesize

    93KB

    MD5

    21c4b849c955253dcfee8e22c9c7a177

    SHA1

    c479fb5984f03b139a66993698dd7efed90de87b

    SHA256

    321b9bd83abd2207db9d5de56686c52503e0cabf6e3f4a8e4d646e0a348196a8

    SHA512

    c559ca53017a478eab2cb17d33fc41329267de9e4be57f0a5b7089116d2115dd664e44a877efe4d85cb36ab6ed83f6db40977fbcab7e0af701c41a06fa448d18

  • \Windows\SysWOW64\Bobhal32.exe

    Filesize

    93KB

    MD5

    bb21ada94132fc9e616496ff4c89c3b2

    SHA1

    0b8b43dea2f96e81621d2958e19f638cb8f863bc

    SHA256

    fdf126d3423b373030367c242ea742e331d74e2b08c16c1d1bff68e5a2d4590a

    SHA512

    e7f58618c08f0c8c4bd8343bab45fb9701a02f26829140b97f1a26561e0ee95cde42355f180f8365d1ca05b096ca07fae2ab9cfbf8937b20cd6e06327692adf6

  • \Windows\SysWOW64\Cddjebgb.exe

    Filesize

    93KB

    MD5

    c332393b4251bf11c65a2ded1ec1c005

    SHA1

    77d9acd075185bf8e54117d8548425aa3f4b7d49

    SHA256

    ffeac40d07bd6ef0036ffb54e94f97c3e8d193929c425d90eaa882ffddf48ae1

    SHA512

    dbeaed126475dae2ab5644f313a247a23647fb8be5371c9714b5e664e6a6b02fce67dc209392f381884caceaa17c6a5f9d7d4734c994e13f3b9ea975ad0f7564

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    93KB

    MD5

    4bb524a79d32e0976f77e7345869df2e

    SHA1

    90e37e87986b71ce362b68269dd0acec3599e9d8

    SHA256

    d4b42472d569bfb07e7995d01da365c6d751d3492a020dd8b539d411bfb0897d

    SHA512

    a9e74e9216460d69e68f9a8e1a0569eac507300f386bb4f3e0c09ccf71a077d2577b6129d74d91380cc0dd26f2cb1d87eaa34bbc06330f98e52a9d30610abcac

  • \Windows\SysWOW64\Cpfaocal.exe

    Filesize

    93KB

    MD5

    5e82d0aed8babe6d53d29cafa00547ec

    SHA1

    95084b7b40ab758f4b4605d62326f29c92a9bdf1

    SHA256

    d982b6df81f9f45b8e1681c265738d751a0d418ff84796a9d5d12db48d03f0f2

    SHA512

    6f1652f34dbc49f983a6be3e77f184f69f59e6be9daadfb3cdcc29039bab062ff6f496e7d79f795a955be09c6c67acb672397153abffe136df37e42167da763b

  • memory/2112-92-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2112-76-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/2112-68-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2724-54-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2724-62-0x00000000002F0000-0x0000000000323000-memory.dmp

    Filesize

    204KB

  • memory/2724-93-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2772-48-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/2772-89-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2816-25-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2872-96-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2944-34-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/2944-27-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2944-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2952-17-0x0000000000270000-0x00000000002A3000-memory.dmp

    Filesize

    204KB

  • memory/2952-98-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2952-18-0x0000000000270000-0x00000000002A3000-memory.dmp

    Filesize

    204KB

  • memory/2952-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB