Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 02:57
Behavioral task
behavioral1
Sample
c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe
Resource
win10v2004-20241007-en
General
-
Target
c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe
-
Size
456KB
-
MD5
e055b590788c36b7d0a181f4cb0df6c6
-
SHA1
a42911ce1a19720b3832ed96ce8cb7ee89f30192
-
SHA256
c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb
-
SHA512
5370ea4b0e4a373c8288608a896f86d764dbc20e0dc6f9057baac3e98e0555d05ba04374fa4b964057b1cd162b1217418318e73b5a844ef20b2b6f7cde7065f9
-
SSDEEP
12288:UxOWwIKfDy/phgeczlqczZd7LFB3oFHoGnFjVZnykJGvpHGdm:wwFfDy/phgeczlqczZd7LFB3oFHoGnFg
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enhacojl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplkpgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eplkpgnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enhacojl.exe -
Berbew family
-
Executes dropped EXE 3 IoCs
pid Process 2632 Enhacojl.exe 2752 Eplkpgnh.exe 2836 Fkckeh32.exe -
Loads dropped DLL 10 IoCs
pid Process 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 2632 Enhacojl.exe 2632 Enhacojl.exe 2752 Eplkpgnh.exe 2752 Eplkpgnh.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Eplkpgnh.exe Enhacojl.exe File created C:\Windows\SysWOW64\Ahoanjcc.dll Enhacojl.exe File created C:\Windows\SysWOW64\Clkmne32.dll Eplkpgnh.exe File created C:\Windows\SysWOW64\Enhacojl.exe c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe File created C:\Windows\SysWOW64\Ampehe32.dll c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe File created C:\Windows\SysWOW64\Eplkpgnh.exe Enhacojl.exe File created C:\Windows\SysWOW64\Fkckeh32.exe Eplkpgnh.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Eplkpgnh.exe File opened for modification C:\Windows\SysWOW64\Enhacojl.exe c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2560 2836 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enhacojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eplkpgnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkckeh32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ampehe32.dll" c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahoanjcc.dll" Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eplkpgnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enhacojl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eplkpgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Eplkpgnh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2632 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 28 PID 2712 wrote to memory of 2632 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 28 PID 2712 wrote to memory of 2632 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 28 PID 2712 wrote to memory of 2632 2712 c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe 28 PID 2632 wrote to memory of 2752 2632 Enhacojl.exe 29 PID 2632 wrote to memory of 2752 2632 Enhacojl.exe 29 PID 2632 wrote to memory of 2752 2632 Enhacojl.exe 29 PID 2632 wrote to memory of 2752 2632 Enhacojl.exe 29 PID 2752 wrote to memory of 2836 2752 Eplkpgnh.exe 30 PID 2752 wrote to memory of 2836 2752 Eplkpgnh.exe 30 PID 2752 wrote to memory of 2836 2752 Eplkpgnh.exe 30 PID 2752 wrote to memory of 2836 2752 Eplkpgnh.exe 30 PID 2836 wrote to memory of 2560 2836 Fkckeh32.exe 31 PID 2836 wrote to memory of 2560 2836 Fkckeh32.exe 31 PID 2836 wrote to memory of 2560 2836 Fkckeh32.exe 31 PID 2836 wrote to memory of 2560 2836 Fkckeh32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe"C:\Users\Admin\AppData\Local\Temp\c71c8080cc91d66c4e6969d734d337225c2768c616f32d0e993694ea89f11cbb.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Enhacojl.exeC:\Windows\system32\Enhacojl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Eplkpgnh.exeC:\Windows\system32\Eplkpgnh.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5e2ffc264535bbf2883dbcac9bbf176f6
SHA155997452716c7bbe089729fb60c27ff1f9355279
SHA25617818546fd1d70bea216a966c5b7f801f8297fd11fa302e470334d000f549fb5
SHA5121cc3a1aeed47123768de80fc1bbf8f07362cf1ee8afb814f1e1a8cc1cf332c5c2f6cdd5a6af2403896510cbada1a1a55e8b0ac134ccdb67a971044ed6c8d7998
-
Filesize
456KB
MD574f5d582ca2ad2566f72f6e7809e09ee
SHA1a68a3d60042f315c12a4bb41347ae7df57ecc132
SHA256ebb34a4e31a29963bb79d49f76477103ff6c9c1b8283a2d7894f6a26fe74e96a
SHA5126bf437e26311c4c28494dfa86f4ef09cdad4e222c03c422c4f55b4804b2f89313e45576d3a388699913f71c02546c1291b79175919f259c617a6ff2a2cf6862e
-
Filesize
456KB
MD5d47a21852dfd912ef9816d49079a5b69
SHA1ccbb983619b820dcd66b99f1eda3b5abfa17f89f
SHA2565ab863e83a28988427880aab53eec33bf6ddcf1419e7248c80a15b27898aad86
SHA512791196ec75e227878580d567c02bdfbda722ebd3ebadc14b473878ecc0043f17c26b235f2feb33cc149d87ede293e52f03068cf969f74e5fa162ef18ab6158c4