Analysis

  • max time kernel
    94s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/12/2024, 00:20

General

  • Target

    7fc70a41586a3daf5351d92e32ddebe50c65ad1d4664a918305e7320e1d64bcd.exe

  • Size

    192KB

  • MD5

    731d7ab4d9eb40d0e87b3ef1b72afad9

  • SHA1

    a914e8e65f54bdd37f044eb97e4be83e55352ba0

  • SHA256

    7fc70a41586a3daf5351d92e32ddebe50c65ad1d4664a918305e7320e1d64bcd

  • SHA512

    22fa24fceb67382ce9e2edf1528638ffd0dc8fb85dbbe983cbe767d8a4cb5b0f715041f4840ce76630de4585037540db3a59ce14bb64fd9e348013276a2e6792

  • SSDEEP

    3072:fUPwhlqmY/DACkAbeIr4MKy3G7UEqMM6T9pui6yYPaI7DehizrVtNe8ohrQ3N:4whpYbACkAilndpui6yYPaIGckfruN

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fc70a41586a3daf5351d92e32ddebe50c65ad1d4664a918305e7320e1d64bcd.exe
    "C:\Users\Admin\AppData\Local\Temp\7fc70a41586a3daf5351d92e32ddebe50c65ad1d4664a918305e7320e1d64bcd.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Windows\SysWOW64\Ddmaok32.exe
      C:\Windows\system32\Ddmaok32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\SysWOW64\Djgjlelk.exe
        C:\Windows\system32\Djgjlelk.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\Delnin32.exe
          C:\Windows\system32\Delnin32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:744
          • C:\Windows\SysWOW64\Dkifae32.exe
            C:\Windows\system32\Dkifae32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3908
            • C:\Windows\SysWOW64\Dmgbnq32.exe
              C:\Windows\system32\Dmgbnq32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1232
              • C:\Windows\SysWOW64\Dhmgki32.exe
                C:\Windows\system32\Dhmgki32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2432
                • C:\Windows\SysWOW64\Dogogcpo.exe
                  C:\Windows\system32\Dogogcpo.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1340
                  • C:\Windows\SysWOW64\Deagdn32.exe
                    C:\Windows\system32\Deagdn32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:552
                    • C:\Windows\SysWOW64\Dddhpjof.exe
                      C:\Windows\system32\Dddhpjof.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4244
                      • C:\Windows\SysWOW64\Dmllipeg.exe
                        C:\Windows\system32\Dmllipeg.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2436
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 416
                          12⤵
                          • Program crash
                          PID:2848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2436 -ip 2436
    1⤵
      PID:412

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Dddhpjof.exe

            Filesize

            192KB

            MD5

            95038d12249e18fd5e1957dcfc845458

            SHA1

            3a9757f0ad9ab9106621c6311002f6497b28dc8d

            SHA256

            02fa625c52b87d62c7f64a2c77077d7673fde15e7428b664d4bcf28a11ad0a6f

            SHA512

            ab371b8e9a66b2ab660a7a9e1a1cfd721a00f26788f6724026e2e4ca116b57e89c8cf34bd57747ace6c374079b5475095a1bf3fa4d160c23d35532af3ba10105

          • C:\Windows\SysWOW64\Ddmaok32.exe

            Filesize

            192KB

            MD5

            bcbb090deecd14ed6c9be42d2bd40ea5

            SHA1

            8be825d555549c1a19f74396a48c3a448d577479

            SHA256

            df6044001bfed3a6ca08c04dc094eaecfdcbb93c339f4051ff17d1e5f626be99

            SHA512

            50f4b6825e0bc2ce0608205e66b75174f9a356d1019af5f3d4a61373d18ba7597135be7c8408a03f6bc583e18be4574f6c141e8d672e9cae9f054923dcdb03f7

          • C:\Windows\SysWOW64\Deagdn32.exe

            Filesize

            192KB

            MD5

            91c7e8450459460784e7b97b78b5d2c4

            SHA1

            4d0d22eb843cd1e63ad2028b4b14bd7898b7a2ed

            SHA256

            2112c79b3913ff462d7ff22cc06b1a34151c3010d8b3568453a3a1e72371336b

            SHA512

            19e9a9a02bebc908417a1cf205484008f1d873e35c7782f18f593cebad71d9e89f5f9dd04b4a63ad6e043f110b83e0e1eeba01453f6679a91dc496c0696484cb

          • C:\Windows\SysWOW64\Delnin32.exe

            Filesize

            192KB

            MD5

            59db680be400888ab2f342caa0d90ff2

            SHA1

            2852566ae06a49d5b322e39f81207f2a8023445e

            SHA256

            6e724ba2206e879dafc761a064d536f708cf20d8432a633e4db65bbf3340dcaa

            SHA512

            72f24a014612dba4d50d4cf21f52f68d909d02136cb92f5ae7cb9386520b12669767368d2bed63f5b6c62bf07d41b787144eb45ea837b8c108d556692892cec3

          • C:\Windows\SysWOW64\Dhmgki32.exe

            Filesize

            192KB

            MD5

            04897a118eede85927984130e5dd557e

            SHA1

            9666229b95b88241a5a6f2538d27a44c3438ca3d

            SHA256

            882e63de54f662371a8e49cec9d51b3a1ad24916b9da4e073deefd844a9696b1

            SHA512

            ddd9760f17a98d67b6cae430b57da45a0021316c5c16a61bdfc842ac143f191657e871d192215cc21a4f296c4a856e2f7ef05d16f48804730bf592bde5af2d38

          • C:\Windows\SysWOW64\Djgjlelk.exe

            Filesize

            192KB

            MD5

            a1bc9cadf0106452294ab8bb38b1ef00

            SHA1

            37ab4f4a9e0c30db182d3b8a2e5d152b0810f90d

            SHA256

            9e992a7a25f22f59dee873e23a8603ce3088492e0bfb6ca056763024416424d1

            SHA512

            3836ad60501f35eb9fb572069b70648a55fa2336e8c43d234f14ff68f973bc66efae78cf1b1d5ccd50f0b30e02a107125a3104bacaf307fdf62c485a4bef2950

          • C:\Windows\SysWOW64\Dkifae32.exe

            Filesize

            192KB

            MD5

            718549dd28c76dc15935ba066de08fba

            SHA1

            f660c10738370a5d7b08f053f8fc391be46b3ca1

            SHA256

            105f4f586cc7f8ec93bd754556ca0ee0b8d6ad5fae83013f8aa9adc9b8845351

            SHA512

            fa778662827cc91bfa08214b8b3d9605ad4fd3a837cd2a8917dea95189e1edac123187e181f817c46d1dd002c063fb391a2447fe2d7750b4f7aa9e5393ff9e26

          • C:\Windows\SysWOW64\Dmgbnq32.exe

            Filesize

            192KB

            MD5

            92654e1e829134196df1edd2728cac8a

            SHA1

            798d75d2808adf70b88f556df7ec507139f3a88e

            SHA256

            63f7229f6947261e7a70017b1035c5ad33406433802aedbc80732e4bd49df4e5

            SHA512

            237196c10d33f65947d3d0c89d48e6b052ffdb9b597223ef749c1a300dea5b2999d5b172068ebac1d2e516b9de9f45b9f75c42fd4d225eadceb9447756cd3c0a

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            128KB

            MD5

            56a7b5d920807fede3c257632501db34

            SHA1

            0868aea512d59586f5fe2a86061b0057919ca83a

            SHA256

            005388c9dbdf1e0541a819b5b1a6547a97d1cc0bfb49011d278684362ef7a66f

            SHA512

            eabef905833a653ff295dc8ea20d653341e5fdae63fd44f44806c503246364157f7ea33a82fbc78dc86f06119129992e3fa9befbed33cdb830997df8e612e3a8

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            192KB

            MD5

            36643fc0037c52ce4837daff1c03cc63

            SHA1

            d7b8c432d683496fed8c02dbef4b40cac4461e9e

            SHA256

            60d61ca11af087be29a5fcd1f70887a3ed87b33fe4af53f1bcfeccaea45128ed

            SHA512

            a39964e11697d2cb1a66e21dccb90624f7883418a27ada75d64323e6b03ac8db9780924ffd3c874fbc3e903ea34a0f5fa0761213c477b8f23d9810976b55e123

          • C:\Windows\SysWOW64\Dogogcpo.exe

            Filesize

            192KB

            MD5

            ea5a3ce1d582cd80675499c2171a11cf

            SHA1

            77e952ada8379b743d7357c3c2f6e147ae231fb8

            SHA256

            58d7b81911c8fbb09944833952a2db723dbc0a6f15f97b426ebb93016153faf0

            SHA512

            2b78e1ff58e8d271fb7a99ca4050e3d8c2274daff1f260e5ff32799fbaa1776040cdffb55dc59acc7ebba12a27e8822709b0ba02db48f00aa16919c873ff2afb

          • C:\Windows\SysWOW64\Ihidnp32.dll

            Filesize

            7KB

            MD5

            28df198c649799b6e5afcc8168bac965

            SHA1

            aa422926d1c83c269b39892c7cc46309f708d004

            SHA256

            ebafd16cbc01a8502c3fa7fbaaee8e49c2d1845a3ba4ae2b73dfa08712429ed7

            SHA512

            c2cd0b6f4e0a8c861811dbd478bce1a4e7fcec4e158a5505e1022c2f3dd2eeab367a7c208d6b8541ae7ed4dc1b545660e2dc3807570d6df0482d03400192f202

          • memory/552-68-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/744-23-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/744-88-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1232-86-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1232-39-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1340-55-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1340-85-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1668-15-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1668-90-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2432-47-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2432-84-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2436-82-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2436-80-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/3804-89-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/3804-7-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/3908-87-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/3908-31-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4244-83-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4244-71-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4884-0-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4884-79-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB