Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/12/2024, 03:14

General

  • Target

    ce0970733f03dac573e2b39fcc70fa805a4a479fdd0b8fd8058661660f0aa3bb.exe

  • Size

    63KB

  • MD5

    9395ff9e3a239e20ae688400fd27d93e

  • SHA1

    a9de2d678a1fd9dc333bcac7893a2491322eced7

  • SHA256

    ce0970733f03dac573e2b39fcc70fa805a4a479fdd0b8fd8058661660f0aa3bb

  • SHA512

    a5d915830e28f365c0692aa6f8ac73e83e632ca467e283c9cb6d3c935c61012c1988e5172861ea582820c7fd3aed02101ab940a639990b97a727bfe038e88760

  • SSDEEP

    768:CIKjPVvIe0KFuZbmWFrmPvYD4CR74vDl/1H5tmXdnhg20a0kXdnhAPAPDXdnhe:CIK9IeHFuQ2moDU/DkH1juIZo

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce0970733f03dac573e2b39fcc70fa805a4a479fdd0b8fd8058661660f0aa3bb.exe
    "C:\Users\Admin\AppData\Local\Temp\ce0970733f03dac573e2b39fcc70fa805a4a479fdd0b8fd8058661660f0aa3bb.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\Dmefhako.exe
      C:\Windows\system32\Dmefhako.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Windows\SysWOW64\Ddonekbl.exe
        C:\Windows\system32\Ddonekbl.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Windows\SysWOW64\Dfnjafap.exe
          C:\Windows\system32\Dfnjafap.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\SysWOW64\Dmgbnq32.exe
            C:\Windows\system32\Dmgbnq32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4804
            • C:\Windows\SysWOW64\Ddakjkqi.exe
              C:\Windows\system32\Ddakjkqi.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:5072
              • C:\Windows\SysWOW64\Dfpgffpm.exe
                C:\Windows\system32\Dfpgffpm.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2084
                • C:\Windows\SysWOW64\Dmjocp32.exe
                  C:\Windows\system32\Dmjocp32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2692
                  • C:\Windows\SysWOW64\Dddhpjof.exe
                    C:\Windows\system32\Dddhpjof.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4800
                    • C:\Windows\SysWOW64\Dgbdlf32.exe
                      C:\Windows\system32\Dgbdlf32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3480
                      • C:\Windows\SysWOW64\Dmllipeg.exe
                        C:\Windows\system32\Dmllipeg.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3872
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 428
                          12⤵
                          • Program crash
                          PID:3628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3872 -ip 3872
    1⤵
      PID:2460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      63KB

      MD5

      8c8d46f3f61b2b7a104a63c55c295b20

      SHA1

      8f0b3d40152d6e3202bf0ea9eff1c82c428e1aa9

      SHA256

      9e972238e5803a886f1792576dffeafc5909fd30e8baf28aac3f6b76c1ae9f44

      SHA512

      3f16cbf8a67d2d8c71d7ea1652f17052ff2e773ebc2293d7c0f97f2092b15ddb8c33fb6f3a480a8889c51d296a10737239b97da6f06fdc0218a8a92730d3668b

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      63KB

      MD5

      21a2f416c994631d7f67917a5c98b43b

      SHA1

      551849d59e49d5d9d12d51cbfff0bd6c232b857a

      SHA256

      a5edc86e26e783b1b50003dc5660c866d8259d520c58d89c35817e04b7add85a

      SHA512

      33346c81a0892f7476c825f9a93efd29ef2a4400da8523b3befc59814c27f4604a5ccf78b780a60db14f048a9ba1b285927916125377b8bfd990331ca95f825b

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      63KB

      MD5

      14c021c7740160f76bd8fb94f925572b

      SHA1

      bf005bb767c936a9f0ae9db9b565fb7d4c86fab7

      SHA256

      1aa99784f131066f608337f0cf4162169207f85d63869f31925924f081e2b804

      SHA512

      9069e51d25a941d17102c338cfe978c6f7a9067a1a05d319dd2240db6a124438547ba6f1373e7a9e9192310907576454726b8e64f67039d082e5ed17d7665d44

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      63KB

      MD5

      5512045a89a96ee97c87b8ca4d7961d5

      SHA1

      668fe4874eed13e994f07e8a3b2d3dc1ca2994cd

      SHA256

      c62b1d5dcf5e200a9a76785bfb24c2ead5d4ed408f47cae5bb7a44fa5de5e1c7

      SHA512

      e5239ec089c59f0dfe7df58484723278fe56cda8424237334b6a8c831e8242bb4a23876c61ab2caae9923c1f57723610a9ae11545ccffc8d65dc79a53e0cdca3

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      63KB

      MD5

      052b438978f1bd9e5b555943c1113f36

      SHA1

      dfe2361fa39f7dfde40b53f85856a3c27876bf37

      SHA256

      e2844d36a72cce705f2b65a03a73e2639a23c4528eea9a9d587d0910238721f2

      SHA512

      4c55984209e4c926951bf7b38be8d017e9cc046b68ea1d7b8db210335b40d33ce5a14de12809bf7424c09ff2eb3fd8a07cb5ec42552e7035b6a3b3f814b195aa

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      63KB

      MD5

      9ce751d922fd708be7c82282b63ef7b7

      SHA1

      9305ef305806ed609fe3ff89b6f9b3e877eb94db

      SHA256

      2a1af735f3b724c3223396b386dfd2f88703b017066d1d2856b8432bebc92fb5

      SHA512

      8728c34ea4ec72a342831582895b67272f2b1b69699ec1eed8a7ec9e4a9a7a856e51e8922b4c9244c29c75f0d081f31ba4e685b6e439228e4b838e37acd86a06

    • C:\Windows\SysWOW64\Dmefhako.exe

      Filesize

      63KB

      MD5

      d9fda89f816a3f0ed5fea6d264deba12

      SHA1

      2a10527f3dac5ba31ef5f8e6b239e9834f814115

      SHA256

      a628bf79e240ef0baa978711862f91618154179e6d02a755e32515f6e10b0e4e

      SHA512

      8b6d5704c5341b51cdb3d6a1d8c1c5c995862350b7a8b86407e43af7fe9da427cd3f06f1d6b625486e888bc7f0cf35b0556f8d5f3550f4cffc5cec6d4ba56777

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      63KB

      MD5

      1a85b2affa4cf870af396576b9ab80e4

      SHA1

      f9dd37f708997955eab87b4fbd6043c28288afce

      SHA256

      fb42b52e2d3a6080b27a4a04dd6ef798e0362f2c8079220af3c346ce64f3a2d4

      SHA512

      04893852b687dadb84c55b0293e839e4bebb160b0c513127fb86ed7b4d482c89b13dc4a444ebebccfc5a79a84d67fe3692572887833fd52fb9228b3e5ec7abfe

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      63KB

      MD5

      7bc7ab9708c1b9ff50b23f4f028f2227

      SHA1

      0e4cde39a635953a955fb542b75d11a4d3cb054a

      SHA256

      2da29488deb14cff4160c379c9f83db3dd6343b50d88ca127a68bbc9be2c770a

      SHA512

      abaff9342092103b1d4760a545b509d9d44ca6215e4890898b5b5d4ad13f43b60fd14ab799de2f282732d608724550c2a9ee31d1eb397faae19318d0865e98d9

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      63KB

      MD5

      c072048b54bb4653ec9ce038ab75f828

      SHA1

      5f6fe42ae597a01c826e92b7bf685276a6de8603

      SHA256

      f13e505a44c16f68ae201a54c1ff67f60a46127cbf5f87b9e162f8006c67c7ed

      SHA512

      e75c3597824940cbbc09892d4cd39aeccdcdd10ea0f626133537caa5067e29944624de0e31dd1677416fbd3cd9fc0a45cab6ab1ec53784da08e365f68c0b1e18

    • memory/2084-97-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2084-48-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2584-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2584-94-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2584-1-0x0000000000434000-0x0000000000435000-memory.dmp

      Filesize

      4KB

    • memory/2692-56-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2692-89-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3088-16-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3088-102-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3480-85-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3480-72-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3872-80-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3872-84-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4000-9-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4000-92-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4444-99-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4444-24-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4800-87-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4800-64-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4804-32-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/4804-101-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5072-40-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5072-95-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB