Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 12:10

General

  • Target

    7188142e0688c91cc7ab12a62cb8d45a4153d261f22489a4529541b7bd693fb9N.exe

  • Size

    1024KB

  • MD5

    9a5ea2dda653d26372099ba70c900150

  • SHA1

    806f44ad8f4e66f3f1bf9e0ff01f3d4f3cf0a372

  • SHA256

    7188142e0688c91cc7ab12a62cb8d45a4153d261f22489a4529541b7bd693fb9

  • SHA512

    48f0bbc5f04dbdd506436da03f3ff9050886087aa0224b16b1ee9a687baf158c3e042099f77f0bd777a42b30e934259f12739224939c979ab67b4e54a8660ab8

  • SSDEEP

    12288:4jUthOvbFIkY660fIaDZkY660f8jTK/XhdAwlt01PBExKN4P6IfKTLR+6CwUkEoH:UlCgsaDZgQjGkwlks/6HnEO

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Drops file in System32 directory 14 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7188142e0688c91cc7ab12a62cb8d45a4153d261f22489a4529541b7bd693fb9N.exe
    "C:\Users\Admin\AppData\Local\Temp\7188142e0688c91cc7ab12a62cb8d45a4153d261f22489a4529541b7bd693fb9N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\Cfmhdpnc.exe
      C:\Windows\system32\Cfmhdpnc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\Cgoelh32.exe
        C:\Windows\system32\Cgoelh32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\Caifjn32.exe
          C:\Windows\system32\Caifjn32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2144
          • C:\Windows\SysWOW64\Dpapaj32.exe
            C:\Windows\system32\Dpapaj32.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 144
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Caifjn32.exe

    Filesize

    1024KB

    MD5

    b5fed3fa66e0b4a8c050cafa3b37db4e

    SHA1

    523e6b0fb3d0b61a427daf735e000680d5ac072f

    SHA256

    cd91ca57f16aebdf809a969a31de6e1190bb74d1941dff0c1006672302fed964

    SHA512

    74e3d5c57e63e1ef1404a89499d4c00d215c039bb2b93efc8061a17e812db93cc1551fcdfa59e69493721bc5f367b0717e0a628db22f6b24fedd2ac5949655ab

  • \Windows\SysWOW64\Cfmhdpnc.exe

    Filesize

    1024KB

    MD5

    4a85bd252c5399378b43f8c49e04ad1a

    SHA1

    0af8197f580921b319c5aabb4b855c0af9dd2deb

    SHA256

    9b43897289d1057e99fc82a5d821106b43ee69286d35f1afe26fc1a9644b2d71

    SHA512

    7fbadc26576bdbc4730ec814060610085f0489fd68a72246e712655393efad287fb7c45fbfe56f3e22caf370153f17b9e9f46adae21be9fc3c78ad15a7efd949

  • \Windows\SysWOW64\Cgoelh32.exe

    Filesize

    1024KB

    MD5

    94e41317d5ef23f847270b06f2ff70de

    SHA1

    abe6a48224e03024975aa13c79983ff940ad360b

    SHA256

    fd9b2b07975e3abd790243b4c000a6a1c7557b9eaf084a2c1f33745ded47b148

    SHA512

    4800024b75e0dcce8c3e78c62470fa11f278c0e762880cd42d1b2bb395577d7dfa5371f49593baf75ca6aeb8bda5fa80323e99d96a14ad748cf1c98002363519

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    1024KB

    MD5

    9a933721b46c87dabd846d1fed6bedce

    SHA1

    67888c39a63d1699ef10fb0b33c2b26a744c6f1f

    SHA256

    897c15622eb4e7062b16bcf933671b32dc2a7f95ef956ecdd5b7b7cc3ff383c6

    SHA512

    c5d538e948b08fcff1006e9c82a5abad148a94c2d1baa76f0440c69ff6f5dfc6c00a4e100dcc1658ceda497e1e5fff32d6ed21922858c65c47909a8208a8b6f9

  • memory/1668-71-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1668-13-0x0000000000290000-0x00000000002C4000-memory.dmp

    Filesize

    208KB

  • memory/1668-12-0x0000000000290000-0x00000000002C4000-memory.dmp

    Filesize

    208KB

  • memory/1668-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-66-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-42-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-55-0x0000000000330000-0x0000000000364000-memory.dmp

    Filesize

    208KB

  • memory/2604-56-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2604-72-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2656-40-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2656-41-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2656-68-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2696-22-0x0000000000490000-0x00000000004C4000-memory.dmp

    Filesize

    208KB

  • memory/2696-14-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2696-70-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB