Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 20:15
Behavioral task
behavioral1
Sample
0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe
Resource
win10v2004-20241007-en
General
-
Target
0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe
-
Size
448KB
-
MD5
a51c013eef98b94d12752396ef6afb80
-
SHA1
a4832530ff65ac639d18a3ece97d191030524d12
-
SHA256
0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821
-
SHA512
88c6f5d18c30cd570c7020de6c848c371cd48a24d675f0109312bdcffbf163606bd814b4ded191c1cbcfb9846cfc921cc2590b057b1f566552f5fca2109b3ab7
-
SSDEEP
6144:I99U/ZaxxiLUmKyIxLDXXoq9FJZCUmKyIxL4:6Uhw832XXf9Do3p
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dknpmdfc.exe -
Berbew family
-
Executes dropped EXE 5 IoCs
pid Process 2840 Dmjocp32.exe 4428 Deagdn32.exe 4144 Dhocqigp.exe 876 Dknpmdfc.exe 3460 Dmllipeg.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmjocp32.exe 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe File created C:\Windows\SysWOW64\Elkadb32.dll Deagdn32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Deagdn32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe -
Program crash 1 IoCs
pid pid_target Process 1272 3460 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2840 4860 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe 85 PID 4860 wrote to memory of 2840 4860 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe 85 PID 4860 wrote to memory of 2840 4860 0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe 85 PID 2840 wrote to memory of 4428 2840 Dmjocp32.exe 86 PID 2840 wrote to memory of 4428 2840 Dmjocp32.exe 86 PID 2840 wrote to memory of 4428 2840 Dmjocp32.exe 86 PID 4428 wrote to memory of 4144 4428 Deagdn32.exe 87 PID 4428 wrote to memory of 4144 4428 Deagdn32.exe 87 PID 4428 wrote to memory of 4144 4428 Deagdn32.exe 87 PID 4144 wrote to memory of 876 4144 Dhocqigp.exe 88 PID 4144 wrote to memory of 876 4144 Dhocqigp.exe 88 PID 4144 wrote to memory of 876 4144 Dhocqigp.exe 88 PID 876 wrote to memory of 3460 876 Dknpmdfc.exe 89 PID 876 wrote to memory of 3460 876 Dknpmdfc.exe 89 PID 876 wrote to memory of 3460 876 Dknpmdfc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe"C:\Users\Admin\AppData\Local\Temp\0aeb98f087c616de55490f53ae3973b17e66ddc16a9c319d55c4342e018f8821N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 4087⤵
- Program crash
PID:1272
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3460 -ip 34601⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5945b501b2a13863da66ad47cfd65ed37
SHA11de87fe6220384400b7db4189dab0eeab263f52a
SHA25604343caddbf728d03cd31cb730a7b01262ee92db16b98df2e1c35e572d16b0c0
SHA512fecb0f3b17e84c91c9b19982c1f80505387f903459f96d4996c94e1e98aab5c1b8706ae101ff83f31ed93d984d1892dc8521525ac43521b15305715b3dc24973
-
Filesize
448KB
MD52caa8cb013718826f61bb024f8fcdf8c
SHA1ca0ec02b6554a9be22e7723755d9f50fc3d1ddee
SHA2568988e54b24d286ab5dd0a4dc8ef1d3c73c3dd9b27519f69eb3d4b2b6561f8787
SHA512239ce12d970ba9c03d9a4d58071747a890d8312a664ff616893a07d029d64353cb2c00466f2af9a2b2af5f73272952e357096bfc23e2f7c049fe25617d48eb54
-
Filesize
448KB
MD574f2b5b7e77f50349caddca9e321934b
SHA178ddb64f64fefff29b5dc723cb8625f17efe01e5
SHA256d0d4a09b1b339d6030f149ec38d81e2c3e2d15b4e77ed3761128cddb7540360f
SHA512fd4f69e33f45e1a62de09632a332022aaa8ab5c1ad25ef54b7f4dec6bfdfc0da0a75c791802c2076e52c6b446dd513839f33b968183614e28643a98f620efe4c
-
Filesize
448KB
MD5c2b739814c2d5cc031baf589b50b10be
SHA18901a928a59f8ad4ada40caf89978bc2342ca833
SHA2561501a9d9a57d1adbc18eda2b8ab0115b92d84aeb90e5abe2fdd6767778b0a237
SHA512abf66917e86bde5e53631cf3b327d890393b50987063ec39e228e0711d93bb76889ebaee9a3c8bd0a5d718c16c1e5498b9878b11317785112bd993a9e3e049b7
-
Filesize
448KB
MD54e292ea8ad0047d2eb4966607bd681f9
SHA1d6570fca63ff23dd1a9e3116654917ed358dc1d6
SHA2560f1c1c52ba3f89d1bce01e7e3462130bca97d6066f3b7c4c9b44e5d22eb5f970
SHA512f7661e421425947524d201b70d6f902eed1fe37517fbe87b43c2a1597912cad3d04509eb1dcf59e6ca2582508eea196f3e4c343fa98e40fbf14a3b00bcd48bba
-
Filesize
7KB
MD5da4b16385aaa6bfd11d3e70bcd5b713b
SHA1de27af28748580c1194da39830eb2701e8e6bcb8
SHA256771c2b98fc607b5ceb9bc70f4e90ae9703d5febbf56c0ac2ef5b34afbe1b8c31
SHA5122723cbae26eeae35f8e664ec480f78392d82e66a8c17eab3ae32e8c7208b14fc5536ae999b9e15e61a004c90914d84f56b384632a224a7cb053cc08af3438cbe