Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2024, 01:29 UTC

General

  • Target

    8927053a5184dd36313cb18b39780345280bc9ac6b071de3596d1bea58550152N.exe

  • Size

    246KB

  • MD5

    b75e9bbbd842e3e72681c0a856a89470

  • SHA1

    b9926c5c6fbc516c4fa4df867abc4622b630ccf1

  • SHA256

    8927053a5184dd36313cb18b39780345280bc9ac6b071de3596d1bea58550152

  • SHA512

    6d772979a440c6cf56d15c224a641d45afef09b59b992a55620d7fcd363510dbe0197510b19bfbb0d1cb3ccfe54f2e3f45849f93e3fb78624ed3b2e7533b063d

  • SSDEEP

    3072:dPNZIZFCI56e2B1xdLm102VZjuajDMyap9jCyFsWteYCWS3OF9HqoX:dVZOFqe2B1xBm102VQlterS9HrX

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8927053a5184dd36313cb18b39780345280bc9ac6b071de3596d1bea58550152N.exe
    "C:\Users\Admin\AppData\Local\Temp\8927053a5184dd36313cb18b39780345280bc9ac6b071de3596d1bea58550152N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\Nlhgoqhh.exe
      C:\Windows\system32\Nlhgoqhh.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    246KB

    MD5

    407409998802acbad42e2d9f70696a27

    SHA1

    8ab263453f2ba1c0b401d1eefd08c14b7411e0e3

    SHA256

    98d0015a3ff637d9998917b4cc68c740f574defca827580e223747d0f6dae44a

    SHA512

    16eb5dfddaa58e00fbbb9d8b7b6001c1e77ace3d407d808aa2857dab043fabef802e63e593717f1b81963551ef2597f1d87405544359e5aa8f9dea4798587614

  • memory/2160-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2160-18-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2160-13-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2160-12-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2704-16-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2704-14-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.