Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/12/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe
Resource
win10v2004-20241007-en
General
-
Target
e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe
-
Size
860KB
-
MD5
dd951023c6f0631cf1c5513483cab630
-
SHA1
25c0a00409c01360e361c0657d4d4a1984fcb163
-
SHA256
e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3
-
SHA512
407dd8969d2e8fe706b1964dfca57675f86ec4e61722706c9582859a3900b5f1a1481d1c582eeb3bde388a5195f27082dd01392b54b13390eed382b17d6aa6f8
-
SSDEEP
24576:gny5hPuh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YS:gnRbazR0vD
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khldkllj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khldkllj.exe -
Berbew family
-
Executes dropped EXE 3 IoCs
pid Process 2792 Khldkllj.exe 2780 Kmimcbja.exe 2916 Lbjofi32.exe -
Loads dropped DLL 10 IoCs
pid Process 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 2792 Khldkllj.exe 2792 Khldkllj.exe 2780 Kmimcbja.exe 2780 Kmimcbja.exe 2820 WerFault.exe 2820 WerFault.exe 2820 WerFault.exe 2820 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Khldkllj.exe e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe File created C:\Windows\SysWOW64\Eghoka32.dll e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Khldkllj.exe e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe File created C:\Windows\SysWOW64\Kmimcbja.exe Khldkllj.exe File opened for modification C:\Windows\SysWOW64\Kmimcbja.exe Khldkllj.exe File created C:\Windows\SysWOW64\Bodilc32.dll Khldkllj.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Kmimcbja.exe -
Program crash 1 IoCs
pid pid_target Process 2820 2916 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khldkllj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmimcbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eghoka32.dll" e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bodilc32.dll" Khldkllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khldkllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Kmimcbja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khldkllj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmimcbja.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2792 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 30 PID 2124 wrote to memory of 2792 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 30 PID 2124 wrote to memory of 2792 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 30 PID 2124 wrote to memory of 2792 2124 e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe 30 PID 2792 wrote to memory of 2780 2792 Khldkllj.exe 31 PID 2792 wrote to memory of 2780 2792 Khldkllj.exe 31 PID 2792 wrote to memory of 2780 2792 Khldkllj.exe 31 PID 2792 wrote to memory of 2780 2792 Khldkllj.exe 31 PID 2780 wrote to memory of 2916 2780 Kmimcbja.exe 32 PID 2780 wrote to memory of 2916 2780 Kmimcbja.exe 32 PID 2780 wrote to memory of 2916 2780 Kmimcbja.exe 32 PID 2780 wrote to memory of 2916 2780 Kmimcbja.exe 32 PID 2916 wrote to memory of 2820 2916 Lbjofi32.exe 33 PID 2916 wrote to memory of 2820 2916 Lbjofi32.exe 33 PID 2916 wrote to memory of 2820 2916 Lbjofi32.exe 33 PID 2916 wrote to memory of 2820 2916 Lbjofi32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe"C:\Users\Admin\AppData\Local\Temp\e93ea4a40607547ea4f40038e2681b16a45623760480ac2fc95c2f53b2a310e3N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Khldkllj.exeC:\Windows\system32\Khldkllj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Kmimcbja.exeC:\Windows\system32\Kmimcbja.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD53eb7c94cfa8517a21d3d2b3d16a95bea
SHA119327f3fcf54b856619fe166a9ba02b5d8442df5
SHA256b5dffecc4e0e194b73378c4b9a1cc872e0a3243e6e54e7e236cd40816254411f
SHA5121c7cceb6c56092c15965be5a3cada96efc3c1a97b40f66eb882390f840be6daa7e3f03718cac050726aff103e7f6d494e2370316cd2ab85a6ea0309446118a7b
-
Filesize
860KB
MD506ca23a627ca51082b330a8a854f2707
SHA12ab8518e7f20b855fcba68f515be59c0ff1194ac
SHA2566fdd9198e9cda20ffeeadfb6fe488d0ffc65d02b777b76edb2afb4d59b0a5641
SHA512270d5146ac6c132c5cec5f2f12cae245633e9aa836b7ed0bec52b48462dea55f5381caeeef15e6123beb7aff34a55315876f8373a656b6afaa6197bf9ca4aab6
-
Filesize
860KB
MD53482bcc7587f0220f3ba75eeb1eb28e4
SHA136b926f06d0379019d7728d110013f807e3e03bf
SHA256f5db4806ea0f4934434334da7dfa6a383fa564170f8bc53ee5340552131be3ab
SHA5129622ba6d7544d3f9f84b9358e2a1a02d7eb44f5b5b6a541fb3265b250ae1dd3fe6c01edf4453efc2011b23ea8ca51c1102ae36c5e79c0d740c5ea754b9599a7b