Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2024, 00:25

General

  • Target

    41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe

  • Size

    74KB

  • MD5

    d2ed00833f0678e38633958e666e4ac0

  • SHA1

    03e803c12a3ed95e2838de4b77dfe31942a4396e

  • SHA256

    41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5

  • SHA512

    eea6193cdc0bb95592b7490287c4cb94103b6483fd8571e20946ae094ee2fcc4b225f4533f462b70f1a6b01f67ed2c0e452cea21d29766b49e21df0892956355

  • SSDEEP

    1536:3PonaODUZBB/9AIiXf+3+YGSdbjPDt+/+2BgjhuY:3waqmBBVyf4RrDthjhuY

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\Lbjofi32.exe
      C:\Windows\system32\Lbjofi32.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 140
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Lbjofi32.exe

          Filesize

          74KB

          MD5

          f7e7c1b3e133903fa8ec9a2fe44ba626

          SHA1

          cf893e3835db7fa0b9ff433bfa00c5fce533123b

          SHA256

          b4d5cabbd6f4e4953e8b1c4e2b048e94faf2e7599dfde239488d363328d9d8c1

          SHA512

          6c376e2776f00f784817a9f3b49e41f433e99ee9692205d2b7e2018d27a40769d38c8598c833e3732089adfbb02a09bff82d07576a1c708af896e26acf1907b9

        • memory/1620-0-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/1620-13-0x0000000001FE0000-0x0000000002017000-memory.dmp

          Filesize

          220KB

        • memory/1620-12-0x0000000001FE0000-0x0000000002017000-memory.dmp

          Filesize

          220KB

        • memory/1620-19-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/2692-14-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB

        • memory/2692-20-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB