Analysis

  • max time kernel
    94s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 19:51

General

  • Target

    1439c7b5007990bee35796331e2acacb4ab72a21b4cf35717dbf621776de4610.exe

  • Size

    64KB

  • MD5

    c573bc69bad0eb830bf721c3a52ed8fa

  • SHA1

    8aac6a1a2bab817fd95697a41f210c234b0f209e

  • SHA256

    1439c7b5007990bee35796331e2acacb4ab72a21b4cf35717dbf621776de4610

  • SHA512

    0de1ffe17c6aee0fb17ef38db0693a8d4256018f558d914759bb3af02f90d47fd0554ab187a456ba40a3779753e652f2d23f4b2bb159839c8b9853a78ec072db

  • SSDEEP

    1536:dz4VRFQFX5zAPnouMH9t5S551TALQQwCaqn4BUXruCHcpzt/Idn:dz4VRFQ9i1TfyipFwn

Malware Config

Extracted

Family

berbew

C2

http://tat-neftbank.ru/kkq.php

http://tat-neftbank.ru/wcmd.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1439c7b5007990bee35796331e2acacb4ab72a21b4cf35717dbf621776de4610.exe
    "C:\Users\Admin\AppData\Local\Temp\1439c7b5007990bee35796331e2acacb4ab72a21b4cf35717dbf621776de4610.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\Dknpmdfc.exe
      C:\Windows\system32\Dknpmdfc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\Dmllipeg.exe
        C:\Windows\system32\Dmllipeg.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:696
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 396
          4⤵
          • Program crash
          PID:860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 696 -ip 696
    1⤵
      PID:4852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dknpmdfc.exe

      Filesize

      64KB

      MD5

      0618d4c970387b2e73b15bc91865b7d6

      SHA1

      b4d36a6eb07904a329aceb263b654cbf54434fd7

      SHA256

      ff4393425a5c2828326d94b272e7da485f41ff0641f13449198b4c5cfc319968

      SHA512

      1136b6a667da372e715aaa9d7f51947c6b660d7cf7c32e2fbf7d606f1746cfdbaedd86b01a6ea386e70265290288d80b50f703cf719bc14512bb5ea038fe8e2a

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      64KB

      MD5

      15ddde5bba8ea234663fab5b595ecacc

      SHA1

      c8a1963ba1f7eff26a49debd23454a633f960cde

      SHA256

      8e0db6a6594b29e8f80a1f958209022c94838afaf9ce9060d3ca266e3dbf51c9

      SHA512

      7cf0dfe15e1542e531fdfef4f08ffccab2b2c6f5506438a1af6c03866447ba4a968c306f61ac648f2c9afcff79a60aa7f6231dbbbedee126d1369ffafa8d0f1d

    • memory/696-15-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/696-17-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1288-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1288-19-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3060-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3060-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB