Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 23:43

General

  • Target

    6ec43d7c695510ba12d88622254708db9b17fb4e5b3ffc0a8647db9ba914016b.exe

  • Size

    64KB

  • MD5

    810ce960209b0ea063d595c8e5b0a527

  • SHA1

    a101df1eb17bbe97a91902467df688e2ad40d307

  • SHA256

    6ec43d7c695510ba12d88622254708db9b17fb4e5b3ffc0a8647db9ba914016b

  • SHA512

    d7654ba23315eac587a6cc036bbfe430d34d6f7f289455459c8b98c6f3961499e5ecf4eebe1c5efacb67380831200115f6353dcb7ae0b00f0c400a6b4366613b

  • SSDEEP

    1536:6zpFnRIpBR26xkH44G5aqjjcsv8atsb/t9X8DGg9JUkXUwXfzwP:6VFnKpBsFVrTFAPzwP

Malware Config

Extracted

Family

berbew

C2

http://tat-neftbank.ru/kkq.php

http://tat-neftbank.ru/wcmd.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec43d7c695510ba12d88622254708db9b17fb4e5b3ffc0a8647db9ba914016b.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec43d7c695510ba12d88622254708db9b17fb4e5b3ffc0a8647db9ba914016b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\Dhocqigp.exe
      C:\Windows\system32\Dhocqigp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Windows\SysWOW64\Dmllipeg.exe
        C:\Windows\system32\Dmllipeg.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 396
          4⤵
          • Program crash
          PID:2708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3672 -ip 3672
    1⤵
      PID:228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      64KB

      MD5

      8d46b016bbb1bf9d443a3882411a63dc

      SHA1

      04349f1226aacc97f09316bb96ce3e4b920793dd

      SHA256

      06e02f4cdbcb812b4b7c1439c06ef9fc7134fbbf51091e0916ee04b96a61074a

      SHA512

      241ce291e7c00691edd23ad3ec02135a88fa91ea737f727dfcc85c483bb38c557f7f03e1d4f2431d5e3ff990b9517e6e14809e4ca45d2f718a9c962f151d964a

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      64KB

      MD5

      0dc9c7f19484a7080e45731b3653f671

      SHA1

      d9a90853ae6364e1449a8c5c3a6664efe7ca89c4

      SHA256

      1fc0376d36e2b2e86dfccc28956f8f3bf69284291542021bf68def4ddece4546

      SHA512

      c6bd421cf02daee45fac2c3296f90fc4aba67e9970d38a1385d5d836aa3b3553ad782cb998180ce6716018527be07fe82187a193d4cb7c3736dfa16c74d71a87

    • memory/3672-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3672-19-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4852-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4852-20-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4860-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4860-22-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB