Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 05:05
Behavioral task
behavioral1
Sample
cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe
Resource
win7-20240903-en
General
-
Target
cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe
-
Size
93KB
-
MD5
e02c2ca351edbf38e14125fc4e132cd1
-
SHA1
87cd2c233a475cf07633c1902f2e6a58833ac99d
-
SHA256
cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651
-
SHA512
67d2dcd6528b208fb3e8c6db231b8e10b7d1bc9036a3b4fc5c3b927b0afc5e33fc27180b68c33b77fbb96b351b0045ac557a15896a84f9d06c5c50ea483d51c6
-
SSDEEP
1536:gwhTpqKDAWfQCC3/e4O8Yhl7q1KcY1DaYfMZRWuLsV+1L:7zrtfQCCve4qxy9YgYfc0DV+1L
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbffoabe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnmfdb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegoqlof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cchbgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnmfdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cegoqlof.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 6 IoCs
pid Process 2244 Cbffoabe.exe 2900 Cchbgi32.exe 2748 Cnmfdb32.exe 2372 Cegoqlof.exe 2560 Dmbcen32.exe 2536 Dpapaj32.exe -
Loads dropped DLL 15 IoCs
pid Process 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 2244 Cbffoabe.exe 2244 Cbffoabe.exe 2900 Cchbgi32.exe 2900 Cchbgi32.exe 2748 Cnmfdb32.exe 2748 Cnmfdb32.exe 2372 Cegoqlof.exe 2372 Cegoqlof.exe 2560 Dmbcen32.exe 2560 Dmbcen32.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cbffoabe.exe cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe File created C:\Windows\SysWOW64\Fikbiheg.dll Cegoqlof.exe File created C:\Windows\SysWOW64\Nloone32.dll Cnmfdb32.exe File opened for modification C:\Windows\SysWOW64\Dmbcen32.exe Cegoqlof.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Cbffoabe.exe cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe File created C:\Windows\SysWOW64\Acnenl32.dll Cbffoabe.exe File created C:\Windows\SysWOW64\Cnmfdb32.exe Cchbgi32.exe File opened for modification C:\Windows\SysWOW64\Cnmfdb32.exe Cchbgi32.exe File opened for modification C:\Windows\SysWOW64\Cegoqlof.exe Cnmfdb32.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Dmbcen32.exe File created C:\Windows\SysWOW64\Hbocphim.dll cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe File created C:\Windows\SysWOW64\Cchbgi32.exe Cbffoabe.exe File opened for modification C:\Windows\SysWOW64\Cchbgi32.exe Cbffoabe.exe File created C:\Windows\SysWOW64\Niebgj32.dll Cchbgi32.exe File created C:\Windows\SysWOW64\Dmbcen32.exe Cegoqlof.exe File created C:\Windows\SysWOW64\Cegoqlof.exe Cnmfdb32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Dmbcen32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Dmbcen32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2536 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmbcen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbffoabe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cchbgi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnmfdb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegoqlof.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Dmbcen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnmfdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cegoqlof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbocphim.dll" cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cchbgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnmfdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nloone32.dll" Cnmfdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niebgj32.dll" Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fikbiheg.dll" Cegoqlof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acnenl32.dll" Cbffoabe.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2244 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 31 PID 2484 wrote to memory of 2244 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 31 PID 2484 wrote to memory of 2244 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 31 PID 2484 wrote to memory of 2244 2484 cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe 31 PID 2244 wrote to memory of 2900 2244 Cbffoabe.exe 32 PID 2244 wrote to memory of 2900 2244 Cbffoabe.exe 32 PID 2244 wrote to memory of 2900 2244 Cbffoabe.exe 32 PID 2244 wrote to memory of 2900 2244 Cbffoabe.exe 32 PID 2900 wrote to memory of 2748 2900 Cchbgi32.exe 33 PID 2900 wrote to memory of 2748 2900 Cchbgi32.exe 33 PID 2900 wrote to memory of 2748 2900 Cchbgi32.exe 33 PID 2900 wrote to memory of 2748 2900 Cchbgi32.exe 33 PID 2748 wrote to memory of 2372 2748 Cnmfdb32.exe 34 PID 2748 wrote to memory of 2372 2748 Cnmfdb32.exe 34 PID 2748 wrote to memory of 2372 2748 Cnmfdb32.exe 34 PID 2748 wrote to memory of 2372 2748 Cnmfdb32.exe 34 PID 2372 wrote to memory of 2560 2372 Cegoqlof.exe 35 PID 2372 wrote to memory of 2560 2372 Cegoqlof.exe 35 PID 2372 wrote to memory of 2560 2372 Cegoqlof.exe 35 PID 2372 wrote to memory of 2560 2372 Cegoqlof.exe 35 PID 2560 wrote to memory of 2536 2560 Dmbcen32.exe 36 PID 2560 wrote to memory of 2536 2560 Dmbcen32.exe 36 PID 2560 wrote to memory of 2536 2560 Dmbcen32.exe 36 PID 2560 wrote to memory of 2536 2560 Dmbcen32.exe 36 PID 2536 wrote to memory of 2704 2536 Dpapaj32.exe 37 PID 2536 wrote to memory of 2704 2536 Dpapaj32.exe 37 PID 2536 wrote to memory of 2704 2536 Dpapaj32.exe 37 PID 2536 wrote to memory of 2704 2536 Dpapaj32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe"C:\Users\Admin\AppData\Local\Temp\cde557dcc7e6e18f9b14616a1cc0ec901d0bb2cf3ab3568108ca88ac8ab98651.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Cchbgi32.exeC:\Windows\system32\Cchbgi32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Cnmfdb32.exeC:\Windows\system32\Cnmfdb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Cegoqlof.exeC:\Windows\system32\Cegoqlof.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Dmbcen32.exeC:\Windows\system32\Dmbcen32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1448⤵
- Loads dropped DLL
- Program crash
PID:2704
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5fc212d93b0f46a141ebff4052fffafd0
SHA1354cd77e78a2c54887b6cb7133116fc34bc47fe5
SHA25631aa133fb8d0bd0fbbd48e63573753d87082ab771277d54c83f6f34f3d0acff2
SHA5125fc74b21dbf097306954a0dfa299fe8a909491f3944d3fd8984007829bb74f0181d2748c2f0ecd465610e57849b4ffd22afe28016216bf95722d90d87f4692a3
-
Filesize
93KB
MD570534ff04ddaa0f5679393b81d99cec9
SHA13ce37b1238a6e3cd35efc7c1962fe951882812c3
SHA256a981223cd22e5f872e0da5e1006391cd3612675b07f582942b2e5d885b0357fb
SHA512831f6e5f8332e4d5069167908e16110f9277486e76fb9f1ba500bd695b5d237f4d7715747bf7c944ef33f17037317f89267efc7f8f8a459313ea8c4566d5c039
-
Filesize
93KB
MD5b28fb93800e940442f907ca2abaf700a
SHA19327a7596c0e35812d78a9b2e261b5210613b684
SHA256b07390a5564d8b5433e60ea7d9d0ef10ab2b3dd3f9917675a6060e4a9f0f117d
SHA512a255a2eb57daafe0a771c3dca3fe0a6f57009e2a4d03c8571e19ac973b53edeb0cfc8dcde386d853741d2498196e5a74be404ed0c77d2e44afe9ff3cc7cae226
-
Filesize
93KB
MD51456c2429390738eeb91ea69dbb76735
SHA1d28912db92b3ef6cc00749a41633484160383688
SHA256752265a330a8029436918e5ab586a9874959af534fe62f9932a861502e499177
SHA512a50420e5fca92727d4aa9dffe92ed9890a23dde535893061015d1133c02a6a9f5295cbc87223d75f86019405fb18ffb09c7de62c37347240f4888c93e277d9fb
-
Filesize
93KB
MD5a0f74518ce3605cbcd21abfd4e9bb53b
SHA1850881c1daba05b3b15529c3de60f7a1051b7383
SHA2561e3c221c784bf7c7780f8a88353e808ef41cd42e34dc0fc9efc276663c628c74
SHA512637b7045805fa87a027e92f738d856c2971b9df1af37c66cf89e13d1058b36330921b4df4cb4d71b71e4b0a652ebe981065a0a56a20517cd365997323ba1f559
-
Filesize
93KB
MD52330e0f6e265739d4ad087cfc18b006a
SHA1fcb4afe5001edeb37f4e1aad132f9c43ed5d392a
SHA256eceefd609dc21c2f0676b54b51061727e8c2bf621e266df37670ac680317b1e1
SHA512a094840d4d7cf8137327fa45f198d5c565cae6330a5cefc6f891866d6535817199a54a3fa8c9cef145d006c6066c45b31157062c2bfe210756ff01b98266535b