Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe
Resource
win10v2004-20241007-en
General
-
Target
9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe
-
Size
55KB
-
MD5
663a3f0a1abbd95b795fdd31042a5bc4
-
SHA1
eef59fdae7634c77780b14b5616b73f087815ed9
-
SHA256
9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5
-
SHA512
c81c047f5ecdd3cd112c1bf5ed0b2b0361c9c825d28f762e387fd0acdc5f1e7da0eacb2d8fc2b51f745c8acdb1bb7855934ac418acd38ec7ff9f7960b051680b
-
SSDEEP
1536:wAiX6gjjUXY2Q3GhCymetuLyNSoNSd0A3shxD6:w4iiK3wwLyNXNW0A8hh
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 2704 Nlhgoqhh.exe -
Loads dropped DLL 6 IoCs
pid Process 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nlhgoqhh.exe 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe File created C:\Windows\SysWOW64\Lamajm32.dll 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe -
Program crash 1 IoCs
pid pid_target Process 2728 2704 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlhgoqhh.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2704 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 30 PID 1508 wrote to memory of 2704 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 30 PID 1508 wrote to memory of 2704 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 30 PID 1508 wrote to memory of 2704 1508 9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe 30 PID 2704 wrote to memory of 2728 2704 Nlhgoqhh.exe 31 PID 2704 wrote to memory of 2728 2704 Nlhgoqhh.exe 31 PID 2704 wrote to memory of 2728 2704 Nlhgoqhh.exe 31 PID 2704 wrote to memory of 2728 2704 Nlhgoqhh.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe"C:\Users\Admin\AppData\Local\Temp\9cfc9970d6551bc0bf81fd7efa762d767a2d9d5e0776cd4d1d0d5174867596d5.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5b781430d713e9536a746539bd3f74f68
SHA1d724605db3a0d49c80bc6062597a1649906d0b1d
SHA2562c6f3543df830bee17a3e19c8e478c4034d6f62044eec18ccf0ef92e1c8e3638
SHA512a053f923efd463d2d0db8b22a2aa0fbfdd8d868ee78ee6a7bf1e3aeee332a5e1545e2f781c30ef1858a530850fbf4285f6fad1ca8e5dfff7844db882ac60f285