Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 22:28

General

  • Target

    4ed1ba6661f79d8cb078aa627ba04af980557ad926415e6bf8985f6aaf98437a.exe

  • Size

    76KB

  • MD5

    2e830a93870f05d2b65b3922ac3f0bb2

  • SHA1

    1b7fc8ecd0d023337cc30a100bb4aa528fa4b414

  • SHA256

    4ed1ba6661f79d8cb078aa627ba04af980557ad926415e6bf8985f6aaf98437a

  • SHA512

    0fa905b847672b3e2e9390a68602597c3c1dacb83eda11bbaeaf8f63be76ace39315600f2e8b8779b50775b875f33317cf3f647bed2364a725ceeb113cfdb6cb

  • SSDEEP

    1536:KxhMSm0Cvjz0CdgZB8n8ayMkXu5EcZF9lZJ3Aaqt+CBMFEVoA4HioQV+/eCeyvCQ:qhMSyjz0CdgZB8n8ayMcMHZ+ae+CCFmQ

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 16 IoCs
  • Drops file in System32 directory 48 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ed1ba6661f79d8cb078aa627ba04af980557ad926415e6bf8985f6aaf98437a.exe
    "C:\Users\Admin\AppData\Local\Temp\4ed1ba6661f79d8cb078aa627ba04af980557ad926415e6bf8985f6aaf98437a.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SysWOW64\Cjbpaf32.exe
      C:\Windows\system32\Cjbpaf32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\Cmqmma32.exe
        C:\Windows\system32\Cmqmma32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Windows\SysWOW64\Cegdnopg.exe
          C:\Windows\system32\Cegdnopg.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\SysWOW64\Dhfajjoj.exe
            C:\Windows\system32\Dhfajjoj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\SysWOW64\Dfiafg32.exe
              C:\Windows\system32\Dfiafg32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3632
              • C:\Windows\SysWOW64\Dhhnpjmh.exe
                C:\Windows\system32\Dhhnpjmh.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4728
                • C:\Windows\SysWOW64\Djgjlelk.exe
                  C:\Windows\system32\Djgjlelk.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4940
                  • C:\Windows\SysWOW64\Dmefhako.exe
                    C:\Windows\system32\Dmefhako.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1772
                    • C:\Windows\SysWOW64\Dhkjej32.exe
                      C:\Windows\system32\Dhkjej32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1672
                      • C:\Windows\SysWOW64\Dodbbdbb.exe
                        C:\Windows\system32\Dodbbdbb.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:744
                        • C:\Windows\SysWOW64\Dmgbnq32.exe
                          C:\Windows\system32\Dmgbnq32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4752
                          • C:\Windows\SysWOW64\Dhmgki32.exe
                            C:\Windows\system32\Dhmgki32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4464
                            • C:\Windows\SysWOW64\Dkkcge32.exe
                              C:\Windows\system32\Dkkcge32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2224
                              • C:\Windows\SysWOW64\Daekdooc.exe
                                C:\Windows\system32\Daekdooc.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:3476
                                • C:\Windows\SysWOW64\Dgbdlf32.exe
                                  C:\Windows\system32\Dgbdlf32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1252
                                  • C:\Windows\SysWOW64\Dmllipeg.exe
                                    C:\Windows\system32\Dmllipeg.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2424
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 396
                                      18⤵
                                      • Program crash
                                      PID:860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2424 -ip 2424
    1⤵
      PID:636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Cegdnopg.exe

      Filesize

      76KB

      MD5

      72cee42454c95e9a0b40f09d56948826

      SHA1

      70c679842199f27f75b615866d954b9228fc02ce

      SHA256

      1bd7c23da5df18ff24b04f2f495659d669593da62fb11aded042357f032119a7

      SHA512

      01ba3f72c4084fe70a81e7a5a906e2047764c9f2044adfc6afa16ecc8acbb188a21403b32ddc1f0d685ca54486bdff74bacd2aa9ed276bfa8e8306ac326c12f1

    • C:\Windows\SysWOW64\Cjbpaf32.exe

      Filesize

      76KB

      MD5

      9f078188fb98e4ecdfafb04791667011

      SHA1

      8779a02c8c05240443035a7c276236faeb52ce6d

      SHA256

      7f564f4597fe00a939c951c5541f2f9a4566f07b61afb7de9c1d0e386f8e0175

      SHA512

      38c732b8735b8837da984d27764b132285f88124b8005acb1f1e7a6bc62655d75f6188deb964a107fd6ec28ded4dbe9e313836c5603737a564597b96f243593d

    • C:\Windows\SysWOW64\Cmqmma32.exe

      Filesize

      76KB

      MD5

      952e7e51e7c5bd95b66feda7ef8649a3

      SHA1

      e9beb44b76a33bc78333b55452507573ce4d46b5

      SHA256

      a8e6451ad67981145ae537a4420e031c680cb08dc229e131c7a80cfd0d143452

      SHA512

      05bac4cfb89d7c0f8503c132206fefa59b2b58685ed13b302f0cc99f3d62021a9a60a506e5524d08b8771b15bd6b787444c15f64533d459218ec9d0ecc405dcc

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      76KB

      MD5

      1f705cb903528664b2f90c124bcc948f

      SHA1

      da3b233b7734e415549f7fcb119b84504533434b

      SHA256

      2d70aebca11122d488b772e0d52fc4133f0eca8d31ece99d823e0307f1544ddf

      SHA512

      924f60785bdf954bda21e830be43d85d24becd45f4705ca12a80a5c2cfc58bba376ca10aefd49c4dc81e9fa6abffe814b9d6081750bff254f61ec2236083d181

    • C:\Windows\SysWOW64\Dfiafg32.exe

      Filesize

      76KB

      MD5

      9f0c31225a9ab46ff5566363d4811556

      SHA1

      c03d26e42138cb5874af7e5d6627a2810f31feb3

      SHA256

      4e53dd2e0e4a3b68b488a61a9cc70e6edc89a754bf280c039fca3262f1a2c22f

      SHA512

      e3094a311adbb83508202221adb0e12bd731f507cfb308d09a2693431912b01782e0671216366b374a9fe055a2c90aa66a82731ebbd57ab7ef10785a537e6b81

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      76KB

      MD5

      4a3635c1835147d32340699f36a7de19

      SHA1

      b959150cb22bc3a386671adbd8cefc4244788e9c

      SHA256

      4f4b21695c177702952378c32a479468ebb2ebb2b3bd3ca44e4555288fce832b

      SHA512

      f42b7ede088d39934ade5ce7b88ccb7f555689a0407f22668db3176d6d477f05ad85bdeafd6f5233aecb7ef7ae489491efc41fb058877d03ca0f42708cab31de

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      76KB

      MD5

      bb96fd01343833df675428f647ac5bea

      SHA1

      c2ad7ef55f6491ad7810ad20ac56f3c13e09f7e3

      SHA256

      86bc67635000f85ff3a76826bccc899e7421bcf353a42583689789d433f9d61e

      SHA512

      5d2859db508988a45f0e258eb8bb15c7467b6959c402679b083e35f34efb11881bab6dc283b701c04ea71b1de3c593d62a01630c11d8cd1738ee28182e648ca7

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      76KB

      MD5

      d4a9aa312a210136875c6ee4d6fb37c1

      SHA1

      ca8dbb634d0fad34f82d231d03dc28d5db3caae3

      SHA256

      0fc96665424caa0fd54f0ec6f80b37cebcd3f0ce2d8c0063d8cbddac0e03fada

      SHA512

      3e9f80373c23e1b1736eca381fb7752057be172ffda398fcc5e23bdbfa4c74d74ee3ace6d71c29830c263255800dd2d2520d15edaa8b1a136a97942f8552c0a6

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      76KB

      MD5

      9b5607ea0ced2bb653531d83125a112e

      SHA1

      c7c5e606f1ae18ccb29ab4084e6d20b0d0369cb0

      SHA256

      d0b577196f3540d9c537140997377e019a2150230e88826ee15b726ac8ffcfa7

      SHA512

      13deefa22c783de496263872da6c38019e994ef44cccedc243f8aaaff13909714490750a61d8727745b7bb85b8a1ff5c3319b337a4eb3240e6b6cbc6b8678345

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      76KB

      MD5

      e95b494936c08f578fe2a693e0379152

      SHA1

      eac070cf39708d332d2c158e6bbbe20a278ac86e

      SHA256

      4981d1e9c8e3d29df5aa84df3597a39e57b3ff3ecde94a7b46882a4c0a1f6648

      SHA512

      0c638593dd3d88ea285535a8a4fcfac43237952139bdfc85850afca617278a51c68f38fadf1ee31d3860a9b76e580f1c4e8ad86f295ab1f12ea664c990b55617

    • C:\Windows\SysWOW64\Djgjlelk.exe

      Filesize

      76KB

      MD5

      c13ce0f2c527c7fa690ac20e5147476a

      SHA1

      f672a92350d2a617087a5e1347d5c4811eee8ef5

      SHA256

      e6f373f4ec296ee7ceab9ba49252fee2c0144a4a35ae4ff57c6055e656f2d7c8

      SHA512

      ffcd537d41be73dc601973294388901ed2b8d479ada62db6ef7b3dadb48174f9721a328daeef856a027e7ba6df9cce4353e4eb99c649ed0034d00ec740adefa0

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      76KB

      MD5

      72a08ff4b1fa03d778249801867cbcdb

      SHA1

      369f07f8d729efc02edaed6c7ad5834a9a52534d

      SHA256

      7af8d9a4e0497cdcb03b461dc11f48589dd836245a0b917d7cbc8b99eec038af

      SHA512

      05a36180012161a6cb53f0e37c3c654b49f330c2a835dc1a0befd472af8e51d6d64acfaebade31ff0056fd2e3834caeebf380561859e4fc4714c8583daee0c6b

    • C:\Windows\SysWOW64\Dmefhako.exe

      Filesize

      76KB

      MD5

      7fd9e42be61d95001b6bb1499203cd45

      SHA1

      0537458ca31d4e6c4dde9fd78386add1f9ab4d94

      SHA256

      ed307512f5e187ae9d65830ba8ac525a77678590329aa7947cd5d6839b01967b

      SHA512

      edc2f9f6e7d8d4c377a079771b15de57239e09693e26b2c7bf396e4e5643028b9b0796eccb2fdd57ba41f3325e5f9cca08d2dae57ede51bc049ba4bba523e912

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      76KB

      MD5

      0dffde8a43830c564fd1d319fa977995

      SHA1

      49de2960168e3f551ceb33168c92e640bdfe5290

      SHA256

      663d1ce6cdba6dadc588f3cf564179046ac8ff2dc7691620c80953657adf46c0

      SHA512

      15326de470a95b883a1d48cd2c31a0c149dcbe619a082bc4422e91a1783ae3f20ef89e8948002b0f765861123998298773c97e9d64fac6fb9e1ab4a34f0edc11

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      76KB

      MD5

      38135c0704208846dfd24f68fbd09cb9

      SHA1

      175a2fdf7359803b447682b922335c90831dd6af

      SHA256

      f83630d92f14bba852f2ad6c09abc7aecf080bc860496033bb4be0c47709ed99

      SHA512

      c386bffe97e2728deca7a1a077c772fab683643e2e36439d2f7365718e4f54ef40cfbe330aa038caf816f2b537c498ace66f3712cd3274678113fbd4422fa585

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      76KB

      MD5

      1347fc776965525582665a05b9de611f

      SHA1

      43c47ec96953b1e8dbb3740b4240dacf08682a1f

      SHA256

      21820d6c6554156957c94bd797f6a7712024e1db74d6ab46be2bd6081c300561

      SHA512

      93cca04ecca239f6676173501370e7530c7f15728a54158d9a7d761b3ba09b68d0c2c05090394d4cc1e7bfe60731e19bed37f740676bf7cb431e35f83a24da26

    • memory/744-136-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/744-81-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1252-131-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1252-120-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1304-142-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1304-24-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1672-72-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1672-137-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1772-65-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1772-138-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1840-21-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2140-8-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2140-143-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2224-105-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2224-133-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2424-129-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2424-130-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2588-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2588-144-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2588-1-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/2932-40-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3476-112-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3476-132-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3632-41-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3632-141-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4464-96-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4464-134-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4728-140-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4728-48-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4752-88-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4752-135-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4940-57-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4940-139-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB