Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 23:50

General

  • Target

    77de34dc35eddbc5655673bf6f4030da2dd9963d9f0d7b77ca1eba01612cb3a8.exe

  • Size

    74KB

  • MD5

    c6380d1621ccbf30a4850d929c0ff89d

  • SHA1

    f24493069fee44563941f8b338468dae6284bcd5

  • SHA256

    77de34dc35eddbc5655673bf6f4030da2dd9963d9f0d7b77ca1eba01612cb3a8

  • SHA512

    93d80c5dad3c681323aff62649c2da5a8568e7f05533792eced2a6ca0f98db3c2e47f13162286674352f4064467b9ef6944677178f28adea509ba630ea528cdc

  • SSDEEP

    768:BtuA8oViYPSLMoIVHzqovh/VPGQOg3yvBXm6l6QFjyZIr+bFMX5B+Te5SbvX9eg7:PuSVpPedSq45CvBXmqr5ye+b+qe+2gT

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77de34dc35eddbc5655673bf6f4030da2dd9963d9f0d7b77ca1eba01612cb3a8.exe
    "C:\Users\Admin\AppData\Local\Temp\77de34dc35eddbc5655673bf6f4030da2dd9963d9f0d7b77ca1eba01612cb3a8.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\Bdkgocpm.exe
      C:\Windows\system32\Bdkgocpm.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\Bjdplm32.exe
        C:\Windows\system32\Bjdplm32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\Bhhpeafc.exe
          C:\Windows\system32\Bhhpeafc.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\SysWOW64\Bmeimhdj.exe
            C:\Windows\system32\Bmeimhdj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Windows\SysWOW64\Ckiigmcd.exe
              C:\Windows\system32\Ckiigmcd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:480
              • C:\Windows\SysWOW64\Cacacg32.exe
                C:\Windows\system32\Cacacg32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3028
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bjpdmqog.dll

    Filesize

    7KB

    MD5

    e73274b2dbedd56e5af6cffdae83480c

    SHA1

    0a45a99be4952d72c04d2af958a33d48038c7f65

    SHA256

    072d3c3dbf06efbeab0451b1c8135b232aace5cae760709198f99092c73c187c

    SHA512

    f7aa8164c68cef531b7a30baa23d3e485f10d98dbe7f9f95cca4ea985e023cea2df35d8b386aa972fd1e38c39e8f0416dc492ed47b0736ee9b9d50094ba5a810

  • \Windows\SysWOW64\Bdkgocpm.exe

    Filesize

    74KB

    MD5

    5f8447f5d4ea2ddeb8019040672fcccc

    SHA1

    d324ddc05b6d0ea8030eb812fbb9657e05e57d4d

    SHA256

    0b3cd9b7e1abd0200711564910a10876be85050d59c9b6389222cef6ca4c6862

    SHA512

    93b40e1060706bd5fe6ca6400cd78cffc853661b2cafceb6bf59171a40e2b40319011d2cf0e3e12bff58c0a059748888b2f0d228a1c98f0b2f51aa689e1c79f2

  • \Windows\SysWOW64\Bhhpeafc.exe

    Filesize

    74KB

    MD5

    bfd0e6a7ee7ad2f2892d1a14fe3dc04d

    SHA1

    f698074f22766b9b3cdf756ef0ae21267c5375a1

    SHA256

    e48e5ac3d365b4465ed91412e7cb267b8949f64d17904eeee8bca041ae514c10

    SHA512

    bdff004dfeac207245e090106b1eb7e10751c80a4ae5cdb8c14da46907b502695af595ac826a262fabab2487603bfb348513638e3179ebe294f2e65a5e46214c

  • \Windows\SysWOW64\Bjdplm32.exe

    Filesize

    74KB

    MD5

    46e92b3a5d4a1cd29f5039f1fe1c4838

    SHA1

    d6d9dac2955ecf196a9b60aa6ed6e53690e683e4

    SHA256

    79d5f638d26f7f751fa25b109a8f66ebe83db3bcb487ebe31147df853bcc8c5b

    SHA512

    702fc5a2a3023aa1ac1953d7ce87e9d2b273b00feeb768742f59efcb6ec2b763e9800d69009ea480a9806518f66dc266c1bf17dfd38027e1d5eb442319bdee54

  • \Windows\SysWOW64\Bmeimhdj.exe

    Filesize

    74KB

    MD5

    bcfa13546b98892e3bb329ea29527a94

    SHA1

    e57171fd403a35e942e81f8291220f033fe7c75c

    SHA256

    77f6f12e66bbae21c35ec07b54c0a7d259daee306b6e1157cdf60d8140d9474d

    SHA512

    4d682e06c9d9149e80b59ecd01e74b349ff320ec1611ecd5103aa1084da6acc1712a7189031cd7e8754076b859b124adf4e9bf1db9fa8f73b2b1a603f51fe72b

  • \Windows\SysWOW64\Cacacg32.exe

    Filesize

    74KB

    MD5

    d31a2f635179195cf86e1df89afd6728

    SHA1

    b57f2d9abf9f6c69f6520d5cf50eb4884df98203

    SHA256

    c7d2197130479f269e316276d7f91b0798236143710112286fc894549b4ac01b

    SHA512

    939220c2a90201a2e9586a1420b6e97545c2a8e17809bfedc81a96076a42aab505ff94ae9878842f4594f0c834e13cddb482f32628477034f54fb8f94cd89eda

  • \Windows\SysWOW64\Ckiigmcd.exe

    Filesize

    74KB

    MD5

    cfe5b9525e565a95a1babdcb4696c144

    SHA1

    0a1f18a5778fa44c9a75550c6288079a146e1e34

    SHA256

    ed3a8062f34cdcbe0aa85f52fcfc1555e34622602eaa6a13d3c1f10ac5e0152b

    SHA512

    5b9fd84489809dd23610dd7b58e2ab6223cf7773f9edbe1b7c8635c6418fae1c9a862c778235e8a03fd5519eefd4c4d2216455dd06b48d1c2879d12810e48d9f

  • memory/480-71-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/480-85-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2468-61-0x0000000000250000-0x0000000000286000-memory.dmp

    Filesize

    216KB

  • memory/2468-86-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2468-53-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2692-87-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2824-89-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2824-14-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2900-35-0x0000000000250000-0x0000000000286000-memory.dmp

    Filesize

    216KB

  • memory/2900-27-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2900-88-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2944-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2944-12-0x0000000000250000-0x0000000000286000-memory.dmp

    Filesize

    216KB

  • memory/2944-13-0x0000000000250000-0x0000000000286000-memory.dmp

    Filesize

    216KB

  • memory/2944-91-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3028-80-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3028-90-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB