Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 02:22
Behavioral task
behavioral1
Sample
dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe
Resource
win7-20240708-en
General
-
Target
dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe
-
Size
93KB
-
MD5
d253fb9d4da141bf48521df3c706508a
-
SHA1
1fbcea8a7f64ea26d335f6220d7f8f15458d4600
-
SHA256
dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967
-
SHA512
3aba79868b2a81fc52d2addceed828ee7866c4d90858f7112b709cf41c3f226989ce01732c4050c373e855d676c2578e5307a0f9f83e3e74f717395eee3a52ce
-
SSDEEP
1536:NYzdymcyOphebJ7iwDZ9Qjy0KD11DaYfMZRWuLsV+1R:NidOHmJ7iuQjBKD1gYfc0DV+1R
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loclai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llgljn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llbconkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llgljn32.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 5 IoCs
pid Process 2692 Llbconkd.exe 2652 Lghgmg32.exe 2752 Loclai32.exe 2600 Llgljn32.exe 2624 Lepaccmo.exe -
Loads dropped DLL 14 IoCs
pid Process 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 2692 Llbconkd.exe 2692 Llbconkd.exe 2652 Lghgmg32.exe 2652 Lghgmg32.exe 2752 Loclai32.exe 2752 Loclai32.exe 2600 Llgljn32.exe 2600 Llgljn32.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\Llbconkd.exe dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe File opened for modification C:\Windows\SysWOW64\Llbconkd.exe dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe File opened for modification C:\Windows\SysWOW64\Loclai32.exe Lghgmg32.exe File created C:\Windows\SysWOW64\Llgljn32.exe Loclai32.exe File created C:\Windows\SysWOW64\Ogegmkqk.dll Llbconkd.exe File created C:\Windows\SysWOW64\Agpqch32.dll Lghgmg32.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Llgljn32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Llgljn32.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Llgljn32.exe File created C:\Windows\SysWOW64\Lghgmg32.exe Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Lghgmg32.exe Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Llgljn32.exe Loclai32.exe File created C:\Windows\SysWOW64\Gcakqmpi.dll dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe File created C:\Windows\SysWOW64\Loclai32.exe Lghgmg32.exe File created C:\Windows\SysWOW64\Lgfikc32.dll Loclai32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 2624 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loclai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llgljn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llbconkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lghgmg32.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcakqmpi.dll" dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loclai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Llgljn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llgljn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lghgmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llgljn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogegmkqk.dll" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agpqch32.dll" Lghgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgfikc32.dll" Loclai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llbconkd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2692 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 30 PID 2640 wrote to memory of 2692 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 30 PID 2640 wrote to memory of 2692 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 30 PID 2640 wrote to memory of 2692 2640 dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe 30 PID 2692 wrote to memory of 2652 2692 Llbconkd.exe 31 PID 2692 wrote to memory of 2652 2692 Llbconkd.exe 31 PID 2692 wrote to memory of 2652 2692 Llbconkd.exe 31 PID 2692 wrote to memory of 2652 2692 Llbconkd.exe 31 PID 2652 wrote to memory of 2752 2652 Lghgmg32.exe 32 PID 2652 wrote to memory of 2752 2652 Lghgmg32.exe 32 PID 2652 wrote to memory of 2752 2652 Lghgmg32.exe 32 PID 2652 wrote to memory of 2752 2652 Lghgmg32.exe 32 PID 2752 wrote to memory of 2600 2752 Loclai32.exe 33 PID 2752 wrote to memory of 2600 2752 Loclai32.exe 33 PID 2752 wrote to memory of 2600 2752 Loclai32.exe 33 PID 2752 wrote to memory of 2600 2752 Loclai32.exe 33 PID 2600 wrote to memory of 2624 2600 Llgljn32.exe 34 PID 2600 wrote to memory of 2624 2600 Llgljn32.exe 34 PID 2600 wrote to memory of 2624 2600 Llgljn32.exe 34 PID 2600 wrote to memory of 2624 2600 Llgljn32.exe 34 PID 2624 wrote to memory of 2588 2624 Lepaccmo.exe 35 PID 2624 wrote to memory of 2588 2624 Lepaccmo.exe 35 PID 2624 wrote to memory of 2588 2624 Lepaccmo.exe 35 PID 2624 wrote to memory of 2588 2624 Lepaccmo.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe"C:\Users\Admin\AppData\Local\Temp\dc9401805c748dea2e082cac792922d8fa78f02f4822e7112d2eeb6a289ad967.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Llbconkd.exeC:\Windows\system32\Llbconkd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Lghgmg32.exeC:\Windows\system32\Lghgmg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Loclai32.exeC:\Windows\system32\Loclai32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Llgljn32.exeC:\Windows\system32\Llgljn32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 1407⤵
- Loads dropped DLL
- Program crash
PID:2588
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD57a3b7fa0d57cd2c732649946e5a1746e
SHA1df89c1d356ec000285664a226f26cfe411ac7411
SHA2566193ea800c44d7d5c2132d039ebe6e9d55c184b3423f193d4b0468028e9b115c
SHA512f5c23522a2bb095f6f9b16f7200f2ebe4330a36dfde8232ab58d40fd2c4f2d0196e7d7e4c1426fa3afa0b2e29390c13a5c7b1e2a947240425e2c82350f8e7e43
-
Filesize
93KB
MD5643f7edbeea5bfcab8f2202b8fd8dc96
SHA1594790a45dbcb54d00d40605cc8bf4f7a62e23e1
SHA25630184bc0c351dbe6896e599297fbc2da939cbd7cb23bbc564a3ffaa7c11f3630
SHA512b2779dcc2e5d02fe95cb75d47c633d86430a6af7e015d693830e2d38f7536d9ad0660c6ef38cd34c2b33aea914cb9bffe04a6e8c155758f1b8494c04e2df3126
-
Filesize
93KB
MD562e80f2cfaebc41002d5e6f4559162dc
SHA17dff26822275c18b52ce4506afd7a0f6205bace5
SHA256e7d7418fe8fe9e67021e6f2312b0f046d6ee2b53ab6e6cf26cdb853fade46826
SHA5127e79098c98e296f769a9685fafd37a26604f1520e93a5928ec968dcf98e302e6cc78bcafa5fbcd488fde9e9ee4cb602ee66fb5550395c69f0750a2f8c368e698
-
Filesize
93KB
MD5484a6119647dbb0f62378c1b51db1a9c
SHA12cb3c2adf7682946b266bf9b7f35eaef22f2747f
SHA256b613334b3cbc8361feecee1e8e3648c6efcf2fdb9ab6211cc8d483a0f791af8d
SHA512317af346827ee3b9b0d66d37fa37bf0be8bed48610bd8fa519260c5e706feb6471dabe5b9f5c81df53c8552a53e0621489a1a97adc7816942e3edc630a1e9cfc
-
Filesize
93KB
MD5b608aaa25745bfff6f8290c14836fa7c
SHA13033ff1b20ac0456b9b24f1a2500e217cf388e5f
SHA256eb93db6ba0bd4d5b53156ea19465364ecfb3bbea6045d2c66c6608a80871fc73
SHA5127cb009c247c37048a3448f464f8dabe5a66d6d68f33b0b6fdb4cbed8a8d38ac06bceec5a82e93e67071f77e7fd7f70f460e3d88901694e7d50950591b87c8519