Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 04:21

General

  • Target

    e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe

  • Size

    472KB

  • MD5

    4c726f8aa7ef85790cf2c30ecae4d7c0

  • SHA1

    ece8b48802694a41a7949f6ba7dcd1962508f4b0

  • SHA256

    e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cf

  • SHA512

    b93ae451b7ac1b9c5c868d846334947dcb38b0d355fc81919afd1a6e9a82003430b68226761e6a1e2ca099f802eee868fa63711d70dd1596aa099e8a1337cf19

  • SSDEEP

    3072:OfC8RinudiP52xx67lLdYiHDoxfhf1xHPs/HqP4UihL7z8:OfPkgiPA6RWPxfhfTHPs/HvUihL7g

Malware Config

Signatures

  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe
    "C:\Users\Admin\AppData\Local\Temp\e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 36
      2⤵
      • Program crash
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-1-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB