Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe
Resource
win10v2004-20241007-en
General
-
Target
41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe
-
Size
74KB
-
MD5
d2ed00833f0678e38633958e666e4ac0
-
SHA1
03e803c12a3ed95e2838de4b77dfe31942a4396e
-
SHA256
41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5
-
SHA512
eea6193cdc0bb95592b7490287c4cb94103b6483fd8571e20946ae094ee2fcc4b225f4533f462b70f1a6b01f67ed2c0e452cea21d29766b49e21df0892956355
-
SSDEEP
1536:3PonaODUZBB/9AIiXf+3+YGSdbjPDt+/+2BgjhuY:3waqmBBVyf4RrDthjhuY
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 2692 Lbjofi32.exe -
Loads dropped DLL 6 IoCs
pid Process 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe File created C:\Windows\SysWOW64\Ipafocdg.dll 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe File created C:\Windows\SysWOW64\Lbjofi32.exe 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2692 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2692 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 30 PID 1620 wrote to memory of 2692 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 30 PID 1620 wrote to memory of 2692 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 30 PID 1620 wrote to memory of 2692 1620 41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe 30 PID 2692 wrote to memory of 2700 2692 Lbjofi32.exe 31 PID 2692 wrote to memory of 2700 2692 Lbjofi32.exe 31 PID 2692 wrote to memory of 2700 2692 Lbjofi32.exe 31 PID 2692 wrote to memory of 2700 2692 Lbjofi32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe"C:\Users\Admin\AppData\Local\Temp\41d166f87828a2663d298980ba712fb10502da78a09ce31131f5b9a7c7d644b5N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5f7e7c1b3e133903fa8ec9a2fe44ba626
SHA1cf893e3835db7fa0b9ff433bfa00c5fce533123b
SHA256b4d5cabbd6f4e4953e8b1c4e2b048e94faf2e7599dfde239488d363328d9d8c1
SHA5126c376e2776f00f784817a9f3b49e41f433e99ee9692205d2b7e2018d27a40769d38c8598c833e3732089adfbb02a09bff82d07576a1c708af896e26acf1907b9