Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe
Resource
win10v2004-20241007-en
General
-
Target
3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe
-
Size
96KB
-
MD5
f49246913336342c7600e974f7a7527d
-
SHA1
79ae9062f628b9f36edeb2e18a48b37871d23e0e
-
SHA256
3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00
-
SHA512
f7217cd291a5af721c96f885870f759af07e41403d7aade2e85df14078d289e542ad50769d6743f3645c32a0a6c82f9146ab7f05036de94ea9e08bdcb2e1b54c
-
SSDEEP
1536:s0dOQK8drd+lMtdhfGFE6DOM1/So853EatOy/BOmg1CMy0QiLiizHNQNdq:S6rdbhfwDfQo85vt95Omg1CMyELiAHOi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe -
Berbew family
-
Executes dropped EXE 1 IoCs
pid Process 2808 Nlhgoqhh.exe -
Loads dropped DLL 6 IoCs
pid Process 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nlhgoqhh.exe 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe File created C:\Windows\SysWOW64\Lamajm32.dll 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2808 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlhgoqhh.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2808 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 30 PID 2996 wrote to memory of 2808 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 30 PID 2996 wrote to memory of 2808 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 30 PID 2996 wrote to memory of 2808 2996 3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe 30 PID 2808 wrote to memory of 2936 2808 Nlhgoqhh.exe 31 PID 2808 wrote to memory of 2936 2808 Nlhgoqhh.exe 31 PID 2808 wrote to memory of 2936 2808 Nlhgoqhh.exe 31 PID 2808 wrote to memory of 2936 2808 Nlhgoqhh.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe"C:\Users\Admin\AppData\Local\Temp\3f1e56926b67b98a5a76d67635986f56349067202a5559cfaf6f91ad30d99f00.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55a557720c889ae02570468cae7868d42
SHA1835cbee094c2f2331eb1b93a7bb8365e547056f0
SHA256ae07a0678f92ced68be493ac4572a2257b9d306a7826bfdc33519c884bef2994
SHA51240c6b1da2c11385dc140b96a8af47541379b179f85df919ab9c2b68e2f8d2b39c7cfe2daec52a3002f6310b57e6b6d1c22796c8a5fe0916b50a0f606bc652eaa