Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 04:21

General

  • Target

    e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe

  • Size

    472KB

  • MD5

    4c726f8aa7ef85790cf2c30ecae4d7c0

  • SHA1

    ece8b48802694a41a7949f6ba7dcd1962508f4b0

  • SHA256

    e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cf

  • SHA512

    b93ae451b7ac1b9c5c868d846334947dcb38b0d355fc81919afd1a6e9a82003430b68226761e6a1e2ca099f802eee868fa63711d70dd1596aa099e8a1337cf19

  • SSDEEP

    3072:OfC8RinudiP52xx67lLdYiHDoxfhf1xHPs/HqP4UihL7z8:OfPkgiPA6RWPxfhfTHPs/HvUihL7g

Malware Config

Signatures

  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe
    "C:\Users\Admin\AppData\Local\Temp\e0d92121b234bf618189f4b0d38f3bea86f6a5bb6b5e7a3d2e1688c8c19773cfN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 224
      2⤵
      • Program crash
      PID:1236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4080 -ip 4080
    1⤵
      PID:536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4080-0-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB