Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 12:05

General

  • Target

    140766b56e4716798acdfd8f6153fb6b621ea9dc1f385a0e2f2229a87ee08555N.exe

  • Size

    120KB

  • MD5

    ddb1fbdb9493a492e0fa5b555af6a710

  • SHA1

    225cdd731ab2cf8eda7f99f324fcbb354103fdb2

  • SHA256

    140766b56e4716798acdfd8f6153fb6b621ea9dc1f385a0e2f2229a87ee08555

  • SHA512

    0c48043ba6844b10f4ece0575370930236c94fae6678948bd100dd5533060586fd6c3bc5e2b45aa33e7714809fa2ae612e3b62e657925586ff680ba0cd7cdd4d

  • SSDEEP

    1536:Th+DZbNUHcDu6uuc3Cq+CmDmmBYZpicm5h5tmjz0cZ44mjD9r823F4:T4DZxU8DT5TCmVGZp3m5tXi/mjRrz3S

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 17 IoCs
  • Drops file in System32 directory 23 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140766b56e4716798acdfd8f6153fb6b621ea9dc1f385a0e2f2229a87ee08555N.exe
    "C:\Users\Admin\AppData\Local\Temp\140766b56e4716798acdfd8f6153fb6b621ea9dc1f385a0e2f2229a87ee08555N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\Boljgg32.exe
      C:\Windows\system32\Boljgg32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\Bkegah32.exe
        C:\Windows\system32\Bkegah32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\Cmedlk32.exe
          C:\Windows\system32\Cmedlk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Windows\SysWOW64\Cnimiblo.exe
            C:\Windows\system32\Cnimiblo.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\SysWOW64\Cnkjnb32.exe
              C:\Windows\system32\Cnkjnb32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\SysWOW64\Ccjoli32.exe
                C:\Windows\system32\Ccjoli32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2652
                • C:\Windows\SysWOW64\Dpapaj32.exe
                  C:\Windows\system32\Dpapaj32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2576
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 144
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bkegah32.exe

    Filesize

    120KB

    MD5

    15d3fb2130a21db5a8cacea8ba985056

    SHA1

    ae6c51261ae573ed2cfe8d63bb3eccca0bba2bfd

    SHA256

    2b7839851c8410878eabf3ac4245d8c0f490b48350c649b5596c68f8daddc0af

    SHA512

    299f251603dfdb00c2e9d747b7e130e91e3812f09df49d2794c23d076680a9c829e42e592fd93e4fad86ba40a68c1a40bc66be990b0106965d2d39f2fd2840a9

  • C:\Windows\SysWOW64\Liempneg.dll

    Filesize

    7KB

    MD5

    4c832901afc92c8eb35c81c98e5e8be4

    SHA1

    af70767fe0c9a58373542e6e4ca642f03042c65f

    SHA256

    ad287d65bc4aff356a159cee65d597633b990b7921c9259e7aa6d3edefe4c9b4

    SHA512

    c7fe76b6e802f861a26c5a23854320581a42c0f08454987d4d7ca65337d341fcfd45647d0f8025bd00dabe358517db15c45931fa67612a88704d77ad031c8377

  • \Windows\SysWOW64\Boljgg32.exe

    Filesize

    120KB

    MD5

    85cff15cc304082efaf48b4618095953

    SHA1

    b61e1e36bece74400a731596a909454bcbf11ff6

    SHA256

    de81c94a208db58f8e50712e751b401aa85f69d457bbba53546c212fc38ada1c

    SHA512

    9ac08b5de09f374fdce05098a5ebfc434921d6d538daa043c7916884637cf8eebf96c6c567ba25b4578b4106aa4f7f9714adb703e3055e0c07c3a92108c58c33

  • \Windows\SysWOW64\Ccjoli32.exe

    Filesize

    120KB

    MD5

    a42994a7b72d8d829ad3f13e8ea3dc5b

    SHA1

    2fa2ed34fa333eb0e111c46d4b28752f9375acbb

    SHA256

    58708fa0f3f34c710a2357287e8b1718dd260f5f7954ed84980baf2a8cc20d2a

    SHA512

    02bfeb9dbada71eb8ae51d6326e4903b29097c4f8a02f93e82fafb2c0f30768c43f2afba5ac29f563b14a10cae2af93d9e2e96677c2111e3a00b2a48fcb6e929

  • \Windows\SysWOW64\Cmedlk32.exe

    Filesize

    120KB

    MD5

    025d609315eb75e9869964d09aac0157

    SHA1

    e95e4731e59c0fbaa5d499896372c26fddff173a

    SHA256

    706bf42fc9393f51c4ecb6a4c62395d86c32f599a9110a58448cc2087d7fceac

    SHA512

    418830e84d1f7474c1ab9d09ecb6831aaa5fa09eedb2f75187545644d844c990235a27227f49fe70b9b5b5613de6e1acca37674f9e5e7845e718508504307ba7

  • \Windows\SysWOW64\Cnimiblo.exe

    Filesize

    120KB

    MD5

    9158f6217e397c62f26dc6bcb3832ae4

    SHA1

    2416388c8a169d593a8b4f77167e13a9c5a2c23e

    SHA256

    c7a2faefcc3950f58a395772669c44c5d7d7204e6e5e1b9c2fbaeb93e7dd957f

    SHA512

    175e24aaf02f15b9ca1083a5b1a55495f631f6cfc167e0f8fe946647f3c30a043939e6f19b156ea36704736b6825daab7df835534560214851932abf6d7e5757

  • \Windows\SysWOW64\Cnkjnb32.exe

    Filesize

    120KB

    MD5

    9f672178499b28c7cde613bd6970a3db

    SHA1

    f2b11b86a3bab014f1befb76c1d67901f5e11175

    SHA256

    823ebab877915ce5480d4bcfef9871ef4bd91eecbd2a938e2a550bc3b2546f77

    SHA512

    ea1559fd0e2da43b46d7c934922018fb227baad4533fba21bf50839f5fbe0a4bc2c27a96d3845fe81465ba2de2c01529b2b276ec9a0e2090a9b0708b3732993f

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    120KB

    MD5

    f536715ae97ff271596829126c986c20

    SHA1

    2479c4328fedebab9464f5703db07dc7036c2d27

    SHA256

    a986b168c7ef8743d56f1e6221386186c85e452c8d270862073ee9e7d6dd275a

    SHA512

    b02512d53e88106a88e782fd1f97f2ecbb0f28e6abc5a963134886c8a68db00a2f6f18f9e540eefcacbd8d1ffd8bf45bbc2fd6bbcdcfb313a2164dcc49141328

  • memory/2260-12-0x00000000002A0000-0x00000000002D4000-memory.dmp

    Filesize

    208KB

  • memory/2260-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2260-114-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2260-11-0x00000000002A0000-0x00000000002D4000-memory.dmp

    Filesize

    208KB

  • memory/2576-106-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2576-97-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2652-89-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2752-68-0x0000000000260000-0x0000000000294000-memory.dmp

    Filesize

    208KB

  • memory/2752-56-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2752-109-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2756-70-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2756-78-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2756-110-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2812-117-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2812-28-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2812-41-0x0000000000290000-0x00000000002C4000-memory.dmp

    Filesize

    208KB

  • memory/2880-115-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2880-54-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2880-42-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3032-14-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3032-118-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3032-25-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB