Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe
Resource
win10v2004-20241007-en
General
-
Target
882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe
-
Size
93KB
-
MD5
6644b023b2b589c3e5b65e10e63878d0
-
SHA1
32fddf87656bd8b0744ed99d8fa66212e209e201
-
SHA256
882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682
-
SHA512
f27902a6c3589359158bc9f75bd52c2c55e32488768ac2f489a4d36ba58aeacc9532941503acadce94f75999f363046bc2b78c7515f038de2eb7228f4f98465f
-
SSDEEP
1536:EIldJhoSNWGG/3LGUw0IHMjh920+YF63vz6VasP0LVksInd8Ron8vp4MqPa/:hldJ/WGO3KUwHG9U+V9KVksIdvnMzaa/
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 4836 Dmllipeg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe File created C:\Windows\SysWOW64\Kngpec32.dll 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 864 4836 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4836 3084 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe 82 PID 3084 wrote to memory of 4836 3084 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe 82 PID 3084 wrote to memory of 4836 3084 882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe"C:\Users\Admin\AppData\Local\Temp\882983beb696911d893d0b89d3b4b0e8d0fbe185b9c203315c14ed6713aeb682.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 4003⤵
- Program crash
PID:864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4836 -ip 48361⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53e3cde6fc586f6b0fe4e4c81a3c811e5
SHA128c7ad955093cdececbe018949dda23cf9c16ab1
SHA2569356420c341d93f396fd38d08f0928f35751ce8f386768c4b9368807a6bb0a82
SHA512730463d737e3a766431e4ba8bd5d43cbbab9183811a53995d167573a764a0bf0d5978dfde556af9d1837d3d34e26be5dcee449ad8e072bf16fc687175d9b1732