Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe
Resource
win10v2004-20241007-en
General
-
Target
4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe
-
Size
64KB
-
MD5
e21a7e058157919197197c8714ddbd70
-
SHA1
8b09e6a57758ddceb4779591fa5bc789a777b410
-
SHA256
4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541
-
SHA512
5ae9e5b0baed92930b4b42d1e8695e494d39e5e94e580b1fe540ebc1364b5c8837302a11c2b0f48cfe91a0849632b6b6d06087084377aa34014c237781f5a519
-
SSDEEP
1536:PJ3vJ/bfry9HuuWvwY0lq9lLBsLnVLdGUHyNwW:5Vb+JuuWr0E9lLBsLnVUUHyNwW
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 2684 Nlhgoqhh.exe -
Loads dropped DLL 6 IoCs
pid Process 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe File created C:\Windows\SysWOW64\Lamajm32.dll 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe File created C:\Windows\SysWOW64\Nlhgoqhh.exe 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2940 2684 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlhgoqhh.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2684 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 30 PID 2172 wrote to memory of 2684 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 30 PID 2172 wrote to memory of 2684 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 30 PID 2172 wrote to memory of 2684 2172 4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe 30 PID 2684 wrote to memory of 2940 2684 Nlhgoqhh.exe 31 PID 2684 wrote to memory of 2940 2684 Nlhgoqhh.exe 31 PID 2684 wrote to memory of 2940 2684 Nlhgoqhh.exe 31 PID 2684 wrote to memory of 2940 2684 Nlhgoqhh.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe"C:\Users\Admin\AppData\Local\Temp\4b65f9af44312c274420a5bcd3707a4e1b062e81d71cb7912e511a97fd6d9541N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fa731ca1ec300085c391b1c531b1d986
SHA1406580c8b1f0f6e6cb8fdfe5a65a867c6e524d43
SHA25633dce401f50ae826c2c571765bbb6f8e36d70c270e20e5db681193709bef5524
SHA512cfad96182038135e3dc0aeba15df16a31b147da39a15607e9c663d506e6ecd135860eda0242c8a92d37c9de31a799acde25f8a127f68db1910834355c09fc46b