Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 19:46

General

  • Target

    0fd8386b4cfcbe82a2859fd611778e25224b7cd3bc050f9877e174a6464bdf93.exe

  • Size

    472KB

  • MD5

    a71da5eb2b4194172edd73fd0bb7bd84

  • SHA1

    73024a9cb5c4ea9dbae0cbf3f50bfc1d30c9416c

  • SHA256

    0fd8386b4cfcbe82a2859fd611778e25224b7cd3bc050f9877e174a6464bdf93

  • SHA512

    d51036758922d7dced8787a765599c3a3f1b7ae071a0e15696cdab712ffd61e4b047793f8ddba0d21d604f8f59bf8abe3cb5206a0928a3eb9a33d097f480e92c

  • SSDEEP

    3072:or8RinudiP52xx67lLdEiHDophJcM3qUzSMIDyv0v0kgnXI:oYkgiPA6RaPphJcM3LBIWvY7

Malware Config

Signatures

  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fd8386b4cfcbe82a2859fd611778e25224b7cd3bc050f9877e174a6464bdf93.exe
    "C:\Users\Admin\AppData\Local\Temp\0fd8386b4cfcbe82a2859fd611778e25224b7cd3bc050f9877e174a6464bdf93.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 36
      2⤵
      • Program crash
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2744-1-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB